This document provides the minimum investigation, scope of review, and documentation requirements for the Enterprise Financial Crimes Compliance (EFFC) and Fraud Investigations (FI).
What is the FIG?
This tool is used to conduct research and compile information on DDA account activity.
What is the DDA inquiry tool?
Erasing information on valid check and replacing it with new information i.e payee name, amount, or signature
What is an altered check?
To review your workbench in Actimize, the dropdown list should be set to this.
What is Fraud-my cases?
This is the scope used for an Alerted Subject Customer to have unusual activity, except for Mortgage, Automobile, Boat and RV Loan cases.
What is scope 7.6.3?
This is primarily used to house the documentation that supports the investigative details and recommendations described in the GED and/or added as case notes directly to the Actimize Case.
What is the Supporting Documentation Spreadsheet (SDS)?
This is a mainframe system used to gather and host customer, account, and transactional data. This system also hosts statement history, teller transactions, wire transactions, and other transactional data/information.
What is hogan?
This happens when Scammers create fake profiles on dating sites to trick people into sending them money.
What is a romance scam?
This red tab is the link that takes us to our case management system that helps create and organize information related to the investigation.
What is Guardian?
This scope is used for Alerted Victim Customers when the Alerted Accounts were closed at the time Triage assigned the case to Investigations
What is scope 7.6.5.1?
Individuals and/or entities are determined to be this when certain identifiers obtained during the investigation meet the criteria:
Full Name (First and Last),
Tax Identification Number (SSN/EIN)
Government Issued Identification (ID) (Driver License, State ID, or Passport)
OR
Partial name with :Date of Birth, Phone Number, E-mail Address
What is a known subject?
This application is used to pull copies of check images, statements, and return deposit slips.
What is CaSTR?
This scheme, involves using stolen or fake identities to obtain a loan or account.
The true individual will inform us if they never created or opened an account with USB.
What is identify theft?
To begin an investigation in Actimize, you set the case to this step.
What is AML case-Inv in Process?
This scope is used when the subsequent investigation identifies, specific EVAFE allegations or activity that meets the following EVAFE criteria.
What is 7.6.6
This search must be conducted for all Alerted Customers determined to be Subjects by an Investigator.
What is a TLO search?
This is an internal website to look up branch and ATM information
What is the ATM branch locator?
This is when someone illegally or improperly uses an older person's money, property, or assets without their consent, often through manipulation, intimidation, or taking advantage of their cognitive decline, for their own personal gain; perpetrators can include family members, caregivers, friends, or even strangers
What is elder financial exploitation?
This icon is used to attach case documents to our case.
This scope is used when any account where the Customer is classified as either a Commercial or classified as a National No-Stop or No-Stop Account.
What is 7.6.5.3
U.S. Bank may have an obligation to conduct this on accounts identified with suspicious activity that remained open after the length of review scope covered in a prior SAR, unless the risk of continuing activity has been mitigated.
What is an RV90?
This is used to view Reg E Claims and branch maintenance requests.
What is customer express?
This is a type of credit card fraud where a person or group of people establish a credit history and then max out their credit line without paying it back. It's also known as hit-and-run fraud.
What is bust-out fraud?
This section of Guardian is where notes regarding loss amount, fraud claims, and open-source research should be placed.
What is General Note?
This scope is used for victims of a BEC / EAC may be limited to the transactional activity.
What is 7.6.5.4?