Customer Due Diligence (CDD):
Quick Recap
1. Introduction to Customer Due Diligence (CDD)
• De nition & Importance: CDD is a critical process in the nancial sector that involves
verifying the identity of customers and assessing their potential risks related to money
laundering, terrorist nancing, and other nancial crimes.
• Regulatory Framework: CDD is mandated by global AML regulations, including the
FATF Recommendations, EU AML Directives, and local jurisdiction laws.
2. Key Components of CDD
S H
Customer Identi cation and Veri cation (CIV):
N
Collecting personal information (e.g., name, address, date of birth) and verifying through
E A
reliable documents (e.g., passport, ID card).
N EY
Bene cial Ownership Identi cation:
I
Determining individuals who own or control more than 25% of an entity, ensuring
V
transparency and preventing misuse.
A I K
Risk Assessment:
Evaluating the risk pro le based on customer type, geographical location, business
K TH
activities, and transaction patterns.
Ongoing Monitoring:
Continuously reviewing customer transactions to identify and report suspicious activities.
R
3. Types of CDD
A
Simpli ed Due Diligence (SDD):
K
For low-risk customers, basic checks are suf cient, such as for regulated entities and
publicly listed companies.
Standard Due Diligence:
Applied to most customers, involving veri cation and risk assessment.
Enhanced Due Diligence (EDD):
For high-risk customers (e.g., PEPs, customers from high-risk jurisdictions), EDD involves
additional veri cation, source of funds checks, and deeper scrutiny.
4. CDD Process: Step-by-Step Guide
Customer Onboarding:
Gather and verify information, establish the customer’s risk pro le.
Risk Pro ling:
1

fi
fi
fi
fi
fi
fi
fi
fi
fi
fi
fi
fi
fi
fi
fi
Assign risk levels (Low, Medium, High) based on factors such as business type, location,
and transaction volume.
Documentation:
Maintain records of all identi cation, veri cation, and due diligence procedures.
Approval & Review:
Compliance team reviews and approves the onboarding based on risk assessment.
Ongoing Monitoring & Review:
Regularly update customer information and monitor for unusual activities.
5. CDD for Different Customer Types
Individuals:
Verify personal details, source of income, and occupation.
H
Corporate Entities:
S N
Identify bene cial owners, understand the nature of the business, and verify through
E
company registries.
N EY
Trusts and Foundations:
I A
Verify trustees, settlors, bene ciaries, and understand the purpose of the trust.
V
Non-Pro t Organizations (NPOs):
A K
Check for legitimacy and ensure funds are not used for illicit purposes.
K TH I
6. Risk Indicators and Red Flags
Customer Behavior:
Reluctance to provide information, complex structures, unusual transaction patterns.
Geographic Risk:
A R
Customers from high-risk jurisdictions or sanctioned countries.
K
Business Risk:
Involvement in high-risk sectors (e.g., gambling, virtual assets, arms trade).
7. Case Studies
Case Study 1: Corporate Entity - Shell Company:
A corporate customer was identi ed as a shell company with complex ownership structures,
leading to further EDD and eventual account closure.
Case Study 2: High-Risk Individual - PEP:
An account linked to a PEP showed signi cant in ows from politically sensitive countries,
triggering SAR (Suspicious Activity Report) ling.
8. Technology and CDD
Role of Technology:
2

fi
fi
fi
fi
fi
fi
fi
fi
fl
Use of AI and machine learning for enhanced risk scoring, automated transaction
monitoring, and identity veri cation.
KYC Utilities:
Shared databases for customer information, reducing onboarding time and improving
accuracy.
9. Challenges in CDD Implementation
Data Privacy Concerns:
Balancing compliance with data protection laws (e.g., GDPR).
Complex Ownership Structures:
Dif culty in identifying UBOs (Ultimate Bene cial Owners) in complex corporate setups.
Regulatory Changes:
H
Staying updated with evolving global and local regulations.
S N
10. Best Practices for Effective CDD
E A
Strong Governance Framework:
N EY
Establish clear policies, procedures, and escalation protocols.
V I
Regular Training and Awareness:
Continuous training for staff to recognize and respond to red ags.
A
Leveraging Technology:
I K
K TH
Use advanced tools for automation, data analytics, and effective monitoring.
11. Conclusion
R
CDD as a Pillar of AML: Effective CDD is essential for preventing nancial crimes and
A
maintaining the integrity of the nancial system. Organizations must stay proactive and adaptable to
changing regulatory landscapes.
3

fi
fi
fi
fi
fl
fi