Transforming Client Onboarding with Robust AML Procedures
Risks to be Considered While Conducting Client Onboarding
Sanctioned Individuals:
Politically Exposed Persons (PEPs):

Terrorists or Terrorist Groups:
Originate from or Connected to High-Risk Countries:
Behaviour Suggests Money Laundering Activities:
Prior Connection with Financial Crimes:
AML Compliance Procedures to Follow During the Client Onboarding Process
Know Your Customer (KYC):
Client Screening:
Risk Assessment:
Configure Transaction Monitoring Rules:
Record-Keeping:
Review and Audits:
Client Onboarding Regulations in Singapore
Know Your Customer (KYC):
- Full name, including aliases
- Unique identification number
- Registered address
- Date of Birth or date of incorporation/registration
- Name, legal form and proof of existence
- Instrument under which the entity is constituted
- Identities of Directors/ Senior-most executive official
- Principal place of business
- Ultimate Beneficial Owners
- Information available on client’s website or published annual reports,
- Information available with public sources such as government directories (Bizfile+), annual returns and filings with regulatory bodies,
- Information from other reliable sources like research reports.
Name Screening:
- Refuse to enter into any transaction with such client,
- Terminate any transaction entered into with the client,
- Report the police.
Risk Assessment:
- Type of client
- Scale of client’s business activities
- Purpose of Business relationship with the client
- Geographic area of client’s business activities
- Client’s business relationships/transactions with persons from/in countries with inadequate AML/CFT measures
- Layers of the client’s business structure
Risk-Based Approach:
- Approval of a senior management official is required before entering into a business relationship with the client.
- Reasonable steps must be taken to establish the relevant person’s source of wealth and source of funds
- Record the basis of assessment
Transaction Monitoring:
Record Keeping:
- All transactions with the client
- All information of the client collected during the CDD process
- Copy of supporting documents relied on during the CDD process
Review and Audit:
Tech Initiatives for Improved Client Onboarding Compliance
Best Practices of Client Onboarding in AML
Follow the precise AML-incorporated client onboarding process.
- Customer Identification: Collect data on customers and verify the same with the help of documentary proof.
- Risk Assessment: Identify the potential risks of the customer to the business and create a risk profile. Categorise the customer as low, medium, or high risk.
- Due Diligence: Standard due diligence is enough if the client is low-risk. In the case of a high-risk client, undertake enhanced customer due diligence, collect more data on such customers, and escalate the case to higher-level authorities.
- Account Opening: On collecting all the customer information, if the client’s risk profile is low or medium, proceed with account opening. If the client is high-risk or only half of the data points are available, reject the application.
- Annual Assessment: Assess the client’s transactions to detect sudden anomalies. Re-evaluate their risks to check for any changes in risk levels and act accordingly.
Create a crisp and clear client onboarding strategy
- Start by defining the objectives of the onboarding process.
- Make a list of all the goals the organisation aims to achieve with this onboarding process.
- Identify the outcomes that the business wishes to achieve.
- Define the step-by-step procedure and guidelines for each step.
- List the resources required for each task.
- Decide upon the timelines and costs associated with each step.
Update the client onboarding process with changing regulatory requirements
- KYC
- CDD
- Transaction monitoring
- Customer screening
Businesses must perform these procedures while onboarding customers. Any changes in these processes must be reflected in the onboarding process. Thus, it is essential to be updated with the regulatory environment and adapt the business’s internal policies to regulatory changes. These adjustments can ensure proper compliance with regulatory requirements during the customer onboarding process.
Use a combination of human and technology-based techniques for identification and verification
- Data collection
- Assessment
- Verification
- Recordkeeping
Manual handling of these processes can be taxing and time-consuming and may lead to high false positives and false negatives. There is a high chance of human error and negligence in identifying critical data. The time-consuming nature of the entire manual process can be a pain point for the customer.
Businesses often resort to advanced technological solutions to tackle this challenge. Automated KYC and CDD solutions collect and verify customers’ data. Advanced systems ensure safe recordkeeping and an overall efficient and secure customer onboarding experience.
Moreover, customers enjoy the automated client onboarding process because it is faster, more accurate, and less complicated. Customers are less likely to get frustrated with repetitive, complicated, or unnecessary questions, so the friction points diminish. Hence, customer drop-offs decrease.
However, complete neglect of human insights is a big mistake. Human eyes can notice strange customer behaviour, which even technology cannot. So, manual checks and technology scanning are necessary to get a 360-degree view of customer risks.
Embrace remote KYC and due diligence methods
- It adds to customers’ convenience. It enables customers to complete the process from anywhere at any time using their devices.
- It avoids the hassle of office visits and producing physical documents. All these are manageable digitally, adding to a positive user experience.
- When customers complete the identification and validation processes remotely, the onboarding is accelerated. Saving time on client onboarding allows businesses to focus on other strategic tasks.
- Technological interventions by the government and regulatory authorities such as MyInfo and Singpass provide the necessary features to check the authenticity of documents and information. This ensures enhanced risk management.
Train the employees on client onboarding in AML
Client onboarding processes require managing a lot of information and documentation, which requires trained and skilled employees. Unskilled employees affect the process’s quality.
Training must be provided on the significance of AML compliance and employee responsibilities. Employees must know the KYC and CDD data points to collect to build the risk profile. These include:
- Identity
- Contact details
- Sources of income/wealth
- Beneficial owners
- Credibility score
- Any mention of sanctions or PEPs
Recordkeeping- The backbone of the AML program
The client onboarding process leads to a massive load of data. Businesses must maintain records of every step of the onboarding process, including KYC, CDD, and KYT (Know Your Transaction) procedures. Records are essential for future use and to ensure compliance. Advanced technologies have systems in place to collect and validate data, which can be used for record keeping.
Authorities refer to these records when conducting audits or investigations of an organisation’s AML compliance processes. Businesses must furnish records such as account details and information about the entity when submitting suspicious activity and cash transaction reports to the Suspicious Transaction Reporting Office (STRO) using the STRO Online Notices and Reporting Platform (SONAR).
Creating a balance between AML compliance and customer experience
- Making efforts to reduce the time taken in AML procedures with the help of advanced technologies
- Prioritising the client’s data privacy and ensuring transparency during the onboarding process to build trust
- Engaging the client with the business’s core products or services to create a long-term relationship.
Motivate customers to furnish correct, complete, and updated data
- Explaining the significance of AML compliance to the client.
- Making the data collection process more manageable and smoother.
- Train employees to engage with clients during the onboarding process to make it a more comfortable experience.
- Incorporate technological solutions to speed up the process.
Adopt a risk-based approach for further due diligence
Upon performing KYC, businesses can identify client risks. So, based on the customer’s risk profile, businesses can perform adequate due diligence measures.
Thus, a risk-based approach must be adopted for customer due diligence. Applying the same and consistent due diligence for all customers is a big mistake.
So, due diligence measures vary based on a customer’s risk profile. If a client is high-risk, enhanced due diligence (EDD) is required. A simple CDD or standard CDD would suffice if the risk is low. This process allows businesses to determine their client acceptance and exit policy.
Increase the KYC and due diligence intensity for foreign customers
- Collect more data about foreign clients, their agents and beneficial owners.
- Assess the AML regulations of the jurisdiction that the client belongs to or is connected with.
- Perform client screening against that jurisdiction’s local sanctions list, PEP lists, and adverse media information.
Ensure sufficient data security policies for keeping customer data safe
- Maintain data confidentiality and security.
- Implement technological solutions to prevent data breaches and hacking.
- Follow privacy regulations to avoid any access by non-permitted users.
- Adopt sound cybersecurity measures and anti-malware policies to protect customer data from malicious actors.
Corroborate client representation with reliable information
It is important not to rely solely on the information provided by the client. Businesses must verify client’s information with reliable documents and evidence. For instance, Businesses can seek a company memorandum and articles of association to verify the particulars of a corporate entity and identify its beneficial owners.
For Politically Exposed Persons (PEPs) or prominent public profiles, businesses can corroborate such client representation against reliable public information sources.
Conclusion
About the Author
Jyoti Maheshwari
CAMS, ACA
Jyoti has over 7+ years of hands-on experience in regulatory compliance, policymaking, risk management, technology consultancy, and implementation. She holds vast experience with Anti-Money Laundering rules and regulations and helps companies deploy adequate mitigation measures and comply with legal requirements. Jyoti has been instrumental in optimizing business processes, documenting business requirements, preparing FRD, BRD, and SRS, and implementing IT solutions.