MLRO Report Template
MLRO Report Template
MLROs play a critical role and are required to satisfy the compliance oversight function (SMF16) and money laundering
reporting function (SMF17) under the Financial Conduct Authority (FCA). Many MLROs have past background and
experience within compliance, legal and other areas within financial services. MLROs are required to complete relevant
training courses and continue to maintain an adequate understanding of current regulatory rules and expectations.
Firms should have an appointed MLRO position prior to seeking authorised and registered status within the FCA.
For more details about the MLRO function, please refer to FCA guidance.
We’ve included recommended sections, guidance text in italics, some starter text you can directly edit and include, and
some tables for you to populate.
You’ll also find some charts in the template. The data for these charts can be found in the accompanying spreadsheet. By
entering your own data in the spreadsheet, the charts are automatically updated to represent your data to show the
effectiveness of your own controls.
2
Table of Contents
Prepared by [NAME], [TITLE]............................................................................................................................................................................................................................................................. 1
How to use this template [DELETE THIS SECTION].................................................................................................................................................................................................................. 2
1. Introduction......................................................................................................................................................................................................................................................................... 4
2. Summary and Conclusion.............................................................................................................................................................................................................................................. 4
3. MLRO Recommendations and Objectives............................................................................................................................................................................................................... 4
4. Financial Crime Journey................................................................................................................................................................................................................................................. 5
4.1. Growth of the Business.............................................................................................................................................................................................................................................. 5
4.2. Growth and Evolution of the Team...................................................................................................................................................................................................................... 5
4.3. New Products / Features.......................................................................................................................................................................................................................................... 5
5. Financial Crime Framework......................................................................................................................................................................................................................................... 6
5.1. AML Governance Framework................................................................................................................................................................................................................................. 7
5.2. Financial Crime Structure........................................................................................................................................................................................................................................ 8
5.3. Governance Committee Structure........................................................................................................................................................................................................................ 8
6. Systems and Control Effectiveness............................................................................................................................................................................................................................ 9
6.1. Staff Training................................................................................................................................................................................................................................................................. 9
6.2. Management Information (MI)........................................................................................................................................................................................................................... 11
6.3. Senior Management Oversight............................................................................................................................................................................................................................ 15
6.4. Policies and Procedures......................................................................................................................................................................................................................................... 15
6.5. Risk Assessment........................................................................................................................................................................................................................................................ 16
6.6. Assurance...................................................................................................................................................................................................................................................................... 17
7. Overview of [INSERT Business Area - i.e., business banking, merchant services, crypto wallet]...............................................................................................19
7.1. Growth / KPIs............................................................................................................................................................................................................................................................. 19
7.2. Summary of Controls............................................................................................................................................................................................................................................... 19
7.3. Key Milestones and Areas of Concern.............................................................................................................................................................................................................. 19
7.4. Onboarding Controls................................................................................................................................................................................................................................................ 20
7.5. Effectiveness of Screening..................................................................................................................................................................................................................................... 23
7.6. Effectiveness of Customer Risk Rating............................................................................................................................................................................................................ 30
7.7. Effectiveness of Customer and Enhanced Due Diligence......................................................................................................................................................................... 32
7.8. Financial Inclusion.................................................................................................................................................................................................................................................... 33
7.9. Effectiveness of Ongoing Monitoring................................................................................................................................................................................................................ 34
3
7.10. Suspicious Activity Reporting.............................................................................................................................................................................................................................. 37
1. Introduction
This section typically includes standard content about how this report meets the regulatory requirements. You may also wish to
clarify the scope of the report - for example, that it includes the opinion and conclusion of the MLRO as well as specific
recommendations to resolve issues. It also may be helpful context to share how these conclusions were reached - were there
external findings, use of data, personal interactions with the business, etc.
The purpose of this report is to provide senior management with a clear view of the effectiveness of the financial crime framework
and meet the firm’s obligation under the Senior Management Arrangements, Systems and Controls (SYSC) requirement 3.2.6G (2).
Firms are required “to ensure that the systems and controls include…appropriate provision of information to its governing body and
senior management, including a report at least annually by that firm's money laundering reporting officer (MLRO) on the operation
and effectiveness of those systems and controls”.
The scope of this report covers management information and the recommendations of the MLRO regarding [BUSINESS AREAS],
across [YEAR]. The opinion and conclusion was achieved through data, internal and external assurance and regular interactions with
the business.
4
The recommendations from this MLRO report are detailed in the table below. We believe that a period of [INSERT] will be required in
order to effectively implement these solutions.
Reference Number Recommendation Owner Due Date
Over the period [DATE] to [DATE], our customer base grew from [x] to [x]. We launched [x] new products, and entered [x] new
markets.
5
4.3. New Products / Features
If you’ve launched a number of new products/features this year, it may be worth including a table with a brief description of that
product/feature, as well as your assessment of financial crime risk.
In [YEAR], the company launched [product], which involves higher risk of [money laundering], particularly around [context]. As a
result, we’ve [made the following changes]. The financial crime team is also working closely with [team] to ensure money laundering
risk is adequately considered prior to the launch [of product / in country].
Our financial crime framework outlines how we’ve structured financial crime risk management and the key components that make up
our strategy.
6
5.1. AML Governance Framework
Outline who is responsible for AML systems and controls. You want to make it clear who is responsible for the duties outlined in
SYSC 3.2.6I and why they or any delegates are suited for that responsibility.
Chief Risk
Officer /
7
Chief
Compliance
Officer
MLRO
Nominated
Officer
Head of
Financial
Crime
1st Line of Defence Financial Crime Ops, Financial Crime Building and implementing controls
Engineering, Financial Crime Data Science, Managing and conducting financial crime operations
Head of Financial Crime
2nd Line of Defence Compliance, Risk and Controls Financial Crime Assurance programme
3rd Line of Defence Internal Audit Internal audit - financial crime, enterprise risk
8
Committee Responsibilities Chair / Members by Role Cadence
Risk and Compliance Identify financial crime risks and MLRO, Chief Risk Officer, Head Monthly
Committee issues, ensure appropriate level of of Financial Crime
oversight and action
Executive Committee
The MLRO and senior staff consisting of [ROLES] also completed [details of additional training] on [DATE].
9
In addition to tracking completion, each training includes [quality checks, such as a quiz] to test for awareness.
New joiners of the financial crime team undergo [INSERT amount of time or number of sessions] as part of their onboarding.
Members of the financial crime team also go through additional training to refresh their knowledge and stay abreast of any changes.
QA findings are used to identify gaps and inform the creation of new training content.
10
6.1.3. Areas of Concern
This is a good section to call out any areas of concern or needs around training, for example, needing support from senior leadership
in order to build a more robust compliance culture.
For newer businesses, you may wish to provide more context before diving into the data, so adjust the order of these sections
accordingly.
11
6.2.1. Financial Crime Risk Appetite MI
The main question you want to address here is: do you know whether or not you’re operating within Risk Appetite? If so, how?
This is a great opportunity to include any data you have around your core risk appetite metrics and where you actually stand relative
to your threshold. We’ve included three possible examples below: % of customers that are PEPs, % of customers that are high risk,
# of SARs per 1000 customers.
Risk Appetite Description Risk Appetite Threshold Was Risk Appetite breached Current Level
during [YEAR]?
6.2.2. Fraud MI
Do you know how much fraud is going through your systems? How effective are you at stopping it? What visibility do you have
around this? This is a great place to highlight the types of fraud you’re seeing or if it’s disproportionately affected any business areas
or specific products. Include any details on the narrative, such as how you compare to your peers in the industry. Are you adhering to
any industry best practices, such as membership of Cifas or the Contingent Reimbursement Model?
12
6.2.3. Incidents MI
How many regulatory or risk appetite breaches or control failures have you experienced this year? How were they dealt with?
13
Incident Title Summary of Incident Occurrence Date Resolution Date Owner
14
6.3. Senior Management Oversight
This section provides the opportunity to evidence that the MLRO has the appropriate level of access and authority as required by
SYSC 3.2.6I.
SYSC 3.2.6I requires that the MLRO has a level of authority and independence within the company and access to resources and
information sufficient to enable them to carry out their responsibility. The below summarises the primary ways in which they’ve
maintained oversight.
● The MLRO has access to key financial crime metrics available via [INSERT]. This is updated in [real time] and contains
[INSERT].
● Interface with the [INSERT] teams - [ROLE] attends [MEETINGS] with [TEAMS] on [INSERT] cadence
● Access to external and internal audit and QA findings
● Senior management receives regular reports on [SCOPE]
Policies and procedures are critical to the effective management of our financial crime risks and it’s the [COMPANY’s] responsibility
to ensure they are adequate, up to date and effectively embedded across the business. Our Financial Crime Policy was last
approved at [Board] on [DATE].
15
Our procedures on [list] were reviewed during [date range] and updated to reduce the risk of manual errors. However, [riskiest
procedures] remain areas of high risk due to the [manual nature of the procedure].
All policies and procedures have been reviewed and approved by the MLRO as of [DATE].
Our financial crime risk assessment should ensure that all financial crime risks to the business are identified and documented so that
we can ensure our systems and controls are comprehensive and proportionate to the growth and maturity of the business. Our risk
assessment was implemented in [DATE] and is reviewed by [committee/owner] on a [cadence] basis.
Throughout [YEAR], our primary financial crime risks have [increased / remained stable / decreased] due to [factors]. Our top three
current risks are [list]. Our risk assessment has evolved to include [changes] which have allowed us to better track and monitor our
risk exposure.
Our risk assessments for [business areas] have been updated in [YEAR] to account for [change] and were reviewed and approved
on [DATE].
16
6.5.2. Areas of Concern
This is a good section to call out any areas of concern - i.e. have you identified any gaps in documented procedures or guidance to
staff? Any outdated content that drove incorrect outcomes? Any reasons to doubt compliance with the regulatory requirement to
have adequate policies and procedures?
6.6. Assurance
You may wish to provide more context about your structure - how many people make up the 2nd and 3rd lines, and what
cadence/form does assurance take? For example, do you have monthly assurance meetings for each business area, a risk
assessment that’s been reviewed/agreed, monitoring programmes, etc. How do you know these have been impactful?
There are [INSERT] full time employees in the [INSERT teams] dedicated to financial crime oversight and assurance. They conduct
[INSERT] meetings on [cadence], in order to [purpose]. In [YEAR] they implemented [programmes, process, etc], which [had this
impact].
2LOD 10% of auto approved 1% of accounts manually Ad hoc reviews only Ad hoc reviews only
Monitoring accounts manually reviewed
Programme reviewed
100% of offboarded
accounts manually
reviewed
17
The 2LOD Assurance Programme is composed of [INSERT] main components: [INSERT - i.e. manual dip sampling, monitoring of
MI, routine assurance reviews, etc].
The 3LOD conducts an internal audit every [CADENCE] which includes the financial crime programme. Their findings and
recommended actions are tracked [INSERT] and owners are assigned from [INSERT, i.e. 1LOD and 2LOD].
[x%] of [Transaction Monitoring] tasks are reviewed for quality assurance. The primary areas tested are: [appropriateness of flag,
accuracy of decision, adherence to policy and procedure].
Previous rules are Control failure / regulatory Risk accepted / root cause
no longer performing or risk appetite breach / fixed / in progress
well due to growth - control gap / inadequate or
increase in flags and ineffective controls
decrease in TPs
18
6.6.2. Areas of Concern
How confident are you that your assurance programme is adequate and effective? Are there any gaps worth calling out? When you
do identify issues, do you have the resources to fix them, or even size them?
7. Overview of [INSERT Business Area - i.e., business banking, merchant services, crypto wallet]
This is an opportunity to share the overall narrative around a specific business area. How has the area changed or grown this year?
What controls do you have in place for each area of your financial crime framework, and how effective are they? What issues have
you identified and how have you dealt with them?
● Overall, our [INSERT controls] were effective at detecting and deterring [INSERT risks].
● Our [INSERT control/process] improved [INSERT %] after [INSERT actions].
This is a good place to call out the largest problems seen this year: what are the main challenges you faced? What about incidents?
19
7.4. Onboarding Controls
What key controls do you have in place at onboarding? How do you know they’re working? It may be helpful to show a diagram of
your controls and where they come into play throughout the life cycle of an account so we’ve included an editable example below.
You may also want to show some statistics in the diagram, to indicate how many flags and true positives are identified at each stage.
Onboarding Identity Adverse Media PEP Sanctions Cifas Checks [Other Fraud
Controls KYC Checks Verification Screening Screening Screening # flagged: Checks]
# auto Screening # flagged: # flagged: # flagged: # false positive: # flagged:
approved: # auto # false positive: # false positive: # false positive: # true positive # false positive:
# manually approved: # true positive # true positive # true positive accepted: # true positive
approved: # manually accepted: accepted: rejected: # true positive accepted:
# auto rejected: approved: # true positive # true positive rejected: # true positive
# manually # auto rejected: rejected: rejected: rejected:
rejected: # manually
rejected:
Ongoing Transaction Monitoring Ongoing PEP Screening Ongoing Adverse Media Ongoing
Monitoring # flagged: # flagged: Screening Sanctions
% false positive: # false positive: # flagged: Screening
% true positive no action: # true positive accepted: # false positive: # flagged:
% true positive SAR’d: # true positive rejected: # true positive accepted: # false positive:
% true positive exited: # true positive rejected: # true positive
accepted:
# true positive
20
rejected:
At onboarding, [x%] of attempted signups are typically rejected, which we believe reduces the number of bad actors using our
services. A customer risk rating is assigned at onboarding which dictates whether an account can be automatically approved or
requires more information for them to [complete signup or begin transacting].
21
The below graph is an estimation of our onboarding control effectiveness based on our dip sampling of accounts.
22
7.5. Effectiveness of Screening
It may be helpful to provide a brief summary of your approach to screening (i.e. vendors used), any impactful changes and generally
whether it’s been adequate and effective. If you utilise Adverse Media checks, you may wish to add an additional subsection.
Since [DATE], we have used [VENDOR] to conduct PEP and Sanctions screening. We have used [VENDOR] for identity verification
checks since [DATE].
23
We are required to apply a risk-based approach to identifying Politically Exposed Persons (PEPs), and to apply a risk-based
approach to performing enhanced due diligence on any PEPs. All true positive PEPs must be approved by [ROLE] prior to account
opening and their risk rating must take their PEP status into account. This ensures that an appropriate level of due diligence is
applied. Checks are conducted as part of onboarding as well as ongoing checks every [CADENCE].
You may wish to explain that PEPs themselves have different risk levels, by showing the split of risk ratings across PEPs.
24
You may wish to show the operational effectiveness of this screening, such as how many flags are raised each month and the true
positive rate. We’ve included an example below.
25
7.5.2. Sanctions Screening
This is a good section to discuss your requirements around Sanctions screening and your approach, such as which lists are used,
the frequency of checks and the types of entities/payments that are screened. You should also highlight any impactful changes and
whether this control has been adequate and effective.
Sanctions screening checks are conducted as part of onboarding as well as ongoing checks every [CADENCE].
You may wish to include some statistics showing the operational impact and effectiveness of this screening, such as how many flags
are raised each month.
26
You may also wish to evidence how you’ve handled any true positive sanctions hits.
Date Had Transacted? Date Reported to OFSI Date Response Received Date Customer
Discovered from OFSI Offboarded
Yes/No
27
7.5.3. Identity Verification Checks
This is a good section to discuss your requirements around identity verification and to highlight any impactful changes and whether
this control/process has been adequate and effective.
Checks are conducted as a part of onboarding. Any failed or unclear results from the vendor are manually reviewed.
You may wish to include some statistics showing the impact and effectiveness of this screening, such as the split of IDV outcomes.
We’ve included an example below.
28
7.5.4. Vendor Effectiveness
This is a good opportunity to share conclusions about how confident you are in your vendors’ effectiveness. You may wish to include
some statistics showing the overall effectiveness of your screening, based on your testing and assurance. We’ve included a sample
graph below.
The below graph is an estimation of our effectiveness based on our dip sampling of accounts. We review [x%] of accounts every
[cadence].
29
[INSERT] % of customers are assigned a risk rating at signup via [process]. The risk rating impacts the [onboarding flow] and the
cadence for [ongoing reviews]. Risk ratings can be adjusted by [INSERT - manual review vs auto only, etc].
You may wish to show the overall split across your customer base by risk rating, as well as contextualise any spikes or shifts. For
example, did you make a change to how you assess risk rating, which resulted in a number of low customers being re-classified as
medium risk?
30
This is also a good opportunity for you to show how effective your risk rating is. For example, if you look at customers you ended up
SARing, how accurate was their initial risk rating? We’ve included a suggested graph below.
31
7.7. Effectiveness of Customer and Enhanced Due Diligence
This is a good section to discuss your requirements and to describe what due diligence you apply at the time of application and on a
risk-based approach. What key controls do you have in place and how do you know they’re working? You should also highlight any
impactful changes and generally whether this control/process has been adequate and effective.
Customer Due Diligence (CDD) includes all the details we require at onboarding or prior to a customer being able to transact. Our
onboarding controls ensure that we remain compliant with JMLSG best practices.
The below graph is an estimation of our onboarding control effectiveness based on our dip sampling of accounts.
32
Enhanced Due Diligence (EDD) is applied to any customer with [a high risk rating] or as part of our ongoing monitoring.
33
SYSC 6.3.7G requires that our systems and controls include measures to ensure fair treatment of customers who may be financially
excluded. As a result, we have specific exceptions to our [INSERT process or control] which allows us to offer accounts to customers
who may not be reasonably able to provide the evidence of identity we typically require.
We carry out Source of Funds and Source of Wealth checks for all [INSERT criteria].
34
This may also be a good section for you to share your rule catalogue if you have one - it’s a great chance to evidence how the
controls you have relate to specific financial crime risks.
Name of Rule Description of Rule Crime Type or Risk Total Flags in [time True Positive Rate
targeted period]
35
This is also a good opportunity for you to show how effective your transaction monitoring is at detecting financial crime. For example,
if you look at the total financial crime you’re aware of, what percentage did your transaction monitoring rules actually flag? We’ve
included a suggested graph below.
We received [number] of reports from law enforcement and other external sources in [YEAR]. The majority of requests related to
[crime types].
36
Source Crime Type Number of Reports Number Resolved / Recommended Actions
Outstanding
37
In [YEAR], we submitted [x] SARs that identified [INSERT crime types].
38
39