This document provides the minimum investigation, scope of review, and documentation requirements for the Enterprise Financial Crimes Compliance (EFFC) and Fraud Investigations (FI).
What is the FIG?
This tool is used to conduct research and compile information on DDA account activity.
What is the DDA inquiry tool?
What is check fraud?
To review your workbench in Actimize, the dropdown list should be set to this.
What is Fraud-my cases?
This is the scope used for an Alerted Subject Customer to have unusual activity, except for Mortgage, Automobile, Boat and RV Loan cases.
What is scope 7.6.3?
This is primarily used to house the documentation that supports the investigative details and recommendations described in the GED and/or added as case notes directly to the Actimize Case.
What is the Supporting Documentation Spreadsheet (SDS)?
This is a mainframe system used to gather and host customer, account, and transactional data. This system also hosts statement history, teller transactions, wire transactions, and other transactional data/information.
What is hogan?
Frequent changes in account information can be a warning sign of this type of fraud.
What is account takeover?
This red tab is the link that takes us to our case management system that helps create and organize information related to the investigation.
What is Guardian?
This scope is used for Alerted Victim Customers when the Alerted Accounts were closed at the time Triage assigned the case to Investigations
What is scope 7.6.5.1?
Individuals and/or entities are determined to be this when certain identifiers obtained during the investigation meet the criteria:
Full Name (First and Last),
Tax Identification Number (SSN/EIN)
Government Issued Identification (ID) (Driver License, State ID, or Passport)
OR
Partial name with :Date of Birth, Phone Number, E-mail Address
What is a known subject?
This application is used to pull copies of check images, statements, and return deposit slips.
What is CaSTR?
This scheme, a perpetrator creates fake accounts or identities to steal money or information from unsuspecting victims. Also known as true name fraud.
What is identify theft?
To begin an investigation in Actimize, you set the case to this step.
What is AML case-Inv in Process?
This scope is used when the subsequent investigation identifies, specific EVAFE allegations or activity that meets the following EVAFE criteria.
What is 7.6.6
This search must be conducted for all Alerted Customers determined to be Subjects by an Investigator.
What is a TLO search?
This is an internal website to look up branch and ATM information
What is the ATM branch locator?
This exploitation occurs when a family member, friend, or caregiver misuses an elders financial resources for their own benefit.
What is elder financial exploitation?
This icon is used to attach case documents to our case.
This scope is used when any account where the Customer is classified as either a Commercial or classified as a National No-Stop or No-Stop Account.
What is 7.6.5.3
U.S. Bank may have an obligation to conduct this on accounts identified with suspicious activity that remained open after the length of review scope covered in a prior SAR, unless the risk of continuing activity has been mitigated.
What is an RV90?
This is used to view Reg E Claims and branch maintenance requests.
What is customer express?
This tactic involves a fraudster posing as a company executive to manipulate employees/vendors into transferring funds.
What is business email compromise?
This section of Guardian is where notes regarding loss amount, fraud claims, and open-source research should be placed.
What is General Note?
This scope is used for victims of a BEC / EAC may be limited to the transactional activity.
What is 7.6.5.4?