Quiz-summary
0 of 30 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
Information
CMFAS Module 1B Premium Access
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 30 questions answered correctly
Your time:
Time has elapsed
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- Answered
- Review
-
Question 1 of 30
1. Question
Terrorism Financing (TF) is regarded as one of the serious financial crimes as per SFA. Which of the following statements correctly define TF?
Correct
Terrorism Funding (TF) may be described as supplying terrorists with funds to carry out acts of terrorism that are typically embedded in political ideologies or philosophies that are intended to manipulate or force governments to take certain actions or to threaten the public or a segment of the population. Funding outlets maybe both illegal and legal.
Incorrect
Terrorism Funding (TF) may be described as supplying terrorists with funds to carry out acts of terrorism that are typically embedded in political ideologies or philosophies that are intended to manipulate or force governments to take certain actions or to threaten the public or a segment of the population. Funding outlets maybe both illegal and legal.
-
Question 2 of 30
2. Question
For national security reasons, a blockade on certain categories of goods, services, or technologies to another nation is/could be referred to as:
I. Partial embargoes
II. Financing Fraud
III. Complete Embargoes
IV. SanctionsCorrect
Sanctions are bans on trade with another nation on certain forms of goods, commodities, or technologies for different reasons, including nuclear disarmament and philanthropic motives. Sanctions, since they ban commerce in a limited number of regions, may be called “partial embargoes”.
Incorrect
Sanctions are bans on trade with another nation on certain forms of goods, commodities, or technologies for different reasons, including nuclear disarmament and philanthropic motives. Sanctions, since they ban commerce in a limited number of regions, may be called “partial embargoes”.
-
Question 3 of 30
3. Question
Which of the following are the effective initiatives that are mostly implemented by the United Nations, the United States, and the EU in an attempt to evoke a constructive response from the country to which they inflict it?
I. Wash Sale
II. Sanctions
III. Embargoes
IV. Matching OrdersCorrect
Embargoes or sanctions: an embargo is a full ban or ban on commerce or financial activities with a government in order to detach it from economic activity. Sanctions are bans on trading with certain kinds of commodities, services, or innovations in another country.
Incorrect
Embargoes or sanctions: an embargo is a full ban or ban on commerce or financial activities with a government in order to detach it from economic activity. Sanctions are bans on trading with certain kinds of commodities, services, or innovations in another country.
-
Question 4 of 30
4. Question
Assume that a representative is aware of the actions of his client and is mindful that the client may be out of town. The agent, taking advantage of the situation and understanding the account specifics of the investor, guides the selling of investments and arranges for transfers to be made to a fictional account managed by him. They will be removed quickly after the funds are collected and the delegate will then vanish. This instance illustrates:
Correct
Internal Fraud: Fraudulent actions are acts involving bribery and dishonesty by which, at the expense of another, an individual gets or attempts to get an advantage or profit. When operating risk is not adequately handled or is triggered by a non-alert employee, they may perpetuate it by workers or third parties. That could happen when someone within the organization uses the name and account of a customer after learning the information.
Incorrect
Internal Fraud: Fraudulent actions are acts involving bribery and dishonesty by which, at the expense of another, an individual gets or attempts to get an advantage or profit. When operating risk is not adequately handled or is triggered by a non-alert employee, they may perpetuate it by workers or third parties. That could happen when someone within the organization uses the name and account of a customer after learning the information.
-
Question 5 of 30
5. Question
Which of the following stages/the entire process of the financial crimes may be stopped by directing the bank staff to contact the customer back to check the orders because if that is not an order provided by the customer, the bank will be notified and it is likely to avoid the action?
Correct
It will be necessary to deter external theft. A good idea is to include a procedure in place to validate the orders for workers awaiting mobile instructions to make a call back to the customer. If it is not a customer’s instruction, so the bank can be alerted and the fraud will be stopped as no sale can be accepted because foreign theft requires telephone records to extract the details from the customer.
Incorrect
It will be necessary to deter external theft. A good idea is to include a procedure in place to validate the orders for workers awaiting mobile instructions to make a call back to the customer. If it is not a customer’s instruction, so the bank can be alerted and the fraud will be stopped as no sale can be accepted because foreign theft requires telephone records to extract the details from the customer.
-
Question 6 of 30
6. Question
Which of the following is an Intergovernmental Agency, of which Singapore is a member, that is set up by the ministers of its member states to ensure successful enforcement of legal, legislative, and organizational interventions against money laundering, terrorist funding, and other financial crimes that challenge the stability of the global financial system?
Correct
Financial Action Task Force (FATF): The FATF Guidelines laid out a detailed and cohesive mechanism for governments to take action to tackle money laundering and terrorism funding, and to fund the development of chemical and biological weapons that could cause massive destruction.
Incorrect
Financial Action Task Force (FATF): The FATF Guidelines laid out a detailed and cohesive mechanism for governments to take action to tackle money laundering and terrorism funding, and to fund the development of chemical and biological weapons that could cause massive destruction.
-
Question 7 of 30
7. Question
In compliance with the Corruption, Drug Trafficking and Other Serious Crimes (Confiscation of Benefits) Act (CDSA), under which circumstances is an individual accused of manipulating their own illicit financial advantages and shall be guilty of money laundering?
I. Any person who discloses any property that reflects his benefits from a fraudulent behavior in entirety or in part.
II. Any person who obscures any asset that (wholly or partially, directly or indirectly) profits from drug smuggling or illegal activity.
III. Any person who passes to the jurisdiction a lawfully profitable property without any prior notice.
IV. Any person who shifts or avoids an illegally powerful asset from the judiciary.Correct
Any person who covers up or camouflages any property that (in full or in part, directly or indirectly) profits from illegal drugs or any illegal conduct; or who converts or keeps it away from authority any such property shall be guilty of a misdemeanor.
Incorrect
Any person who covers up or camouflages any property that (in full or in part, directly or indirectly) profits from illegal drugs or any illegal conduct; or who converts or keeps it away from authority any such property shall be guilty of a misdemeanor.
-
Question 8 of 30
8. Question
The Mutual Assistance in Criminal Matters Act (MACMA) enables the Government of Singapore to offer integrated combat services to other countries against the financial crimes that involve:
Correct
It helps the Government of Singapore to provide other countries with mutual aid since tax evasion or terror financing for terrorism usually includes cross-border transactions. It is impossible to see only one aspect of the transactions, and it is simpler and more reliable during the inquiry if all sides of the transactions are reviewed and analyzed. In specific, this includes high-value ticket products where investments can be made outside the region.
Incorrect
It helps the Government of Singapore to provide other countries with mutual aid since tax evasion or terror financing for terrorism usually includes cross-border transactions. It is impossible to see only one aspect of the transactions, and it is simpler and more reliable during the inquiry if all sides of the transactions are reviewed and analyzed. In specific, this includes high-value ticket products where investments can be made outside the region.
-
Question 9 of 30
9. Question
Which of the following options correctly illustrates the features/characteristics of the Terrorism (Suppression of Financing) Act?
I. It puts a responsibility on everyone to supply the law enforcement officers with details regarding the funding of terrorism.
II. It forbids the funding of terrorists and permits the retention of terrorism-related properties.
III. It offers international aid to other countries regarding prosecutions or judicial proceedings in terms of financial infractions.
IV. It requires any designated officer who works in connection with an inquiry that is about to be carried out under the CDSA to be suspected.Correct
The TSOFA explicitly prohibits the funding of terrorism and permits the seizure and confiscation of extremist and terrorism-related goods. It also puts a responsibility on all to supply the police with information related to the funding of terrorism and failing to do so is a punishable crime.
Incorrect
The TSOFA explicitly prohibits the funding of terrorism and permits the seizure and confiscation of extremist and terrorism-related goods. It also puts a responsibility on all to supply the police with information related to the funding of terrorism and failing to do so is a punishable crime.
-
Question 10 of 30
10. Question
Which of the following is an incorrect guideline from the list of security measures suggested by the MAS on protecting the dignity of the monetary sector against threats resulting from interacting with sanctioned countries and prohibited individuals or persons engaged in restricted activities in sanctioned countries?
Correct
We must take reasonable steps to conform with the FATF’s directions; improve due diligence and pay particular attention to commercial contacts and dealings with persons from or in sanctioned countries; guard against the use of correspondent banking partnerships and front companies to protect illicit activity and to be aware of the effect of dealing with sanctioned countries. Freeze funds and, when alerted, disclose allegations of terrorist financing or fraud.
Incorrect
We must take reasonable steps to conform with the FATF’s directions; improve due diligence and pay particular attention to commercial contacts and dealings with persons from or in sanctioned countries; guard against the use of correspondent banking partnerships and front companies to protect illicit activity and to be aware of the effect of dealing with sanctioned countries. Freeze funds and, when alerted, disclose allegations of terrorist financing or fraud.
-
Question 11 of 30
11. Question
Which of the following options depicts a violation of the MAS laws as per the sanctions under the UN Security Council Resolutions and the accused would therefore be liable for a fine of not more than $1 million on prosecution?
Correct
It demands financial firms to suspend assets or economic properties of designated persons and entities; to refrain from entering into financial transactions or offering financial help or services in relation to designated persons or entities or from exploitation and nuclear or other approved activities; and to alert MAS of any information or evidence relating to funds, other financial support or services related to designated persons or entities.
Incorrect
It demands financial firms to suspend assets or economic properties of designated persons and entities; to refrain from entering into financial transactions or offering financial help or services in relation to designated persons or entities or from exploitation and nuclear or other approved activities; and to alert MAS of any information or evidence relating to funds, other financial support or services related to designated persons or entities.
-
Question 12 of 30
12. Question
From the various circumstances given below, which of the following describe tax evasion as per Section 96 of the Income Tax Act?
I. Any revenue that should be counted is omitted from a return made under the Income Tax Act by someone who prevents the payment of tax.
II. A taxpayer does not respond to any query or statement sought or rendered in compliance with the provisions of this Act, neither orally nor in writing.
III. An individual intentionally prevents or manipulates any other person to prevent taxes and gives false statements regarding the returns that are made.
IV. A person who, in any return made under this Act or in any note made under Section 76(8), makes any honest declaration or entry.Correct
Any person who willfully attempts to avoid or facilitate any other person to avoid taxation, ignores any income that should have been included from a return made under the Income Tax Act; makes any false declaration or entry in any return made under this Act or in any notification made under Section 76 (8); or gives any false response, orally or in writing, to any question or request for information asked regarding the Act shall be guilty of tax evasion.
Incorrect
Any person who willfully attempts to avoid or facilitate any other person to avoid taxation, ignores any income that should have been included from a return made under the Income Tax Act; makes any false declaration or entry in any return made under this Act or in any notification made under Section 76 (8); or gives any false response, orally or in writing, to any question or request for information asked regarding the Act shall be guilty of tax evasion.
-
Question 13 of 30
13. Question
Which of the following instances would not be classified as a demonstration of significant illegal tax evasion as per Section 96A of the Income Tax Act?
I. Any citizen who assists any other citizen in paying tax permits the use of any art or arrangement to deter theft.
II. Any individual who supports any other individual in paying tax adds any money that should be included in a return submitted under this Act.
III. The preparation of any false cash book is approved by any entity that deliberately intends to circumvent the payment of tax.
IV. Any man wanting to support some other person to avoid taxes mandates the use of scam or fabrication.Correct
Any person who knowingly tries to avoid or enable some other individual to circumvent tax plans or obligates the preparation or preservation of any fraudulent balance sheet or other documents or misrepresents or instructs the misrepresentation of any account books or records; or makes use of, or allows the use of, any theft, art or fabrication commits the aforementioned offense.
Incorrect
Any person who knowingly tries to avoid or enable some other individual to circumvent tax plans or obligates the preparation or preservation of any fraudulent balance sheet or other documents or misrepresents or instructs the misrepresentation of any account books or records; or makes use of, or allows the use of, any theft, art or fabrication commits the aforementioned offense.
-
Question 14 of 30
14. Question
Which of the following financial firm representatives are eventually liable to account for maintaining adherence to rules, legislation, and notifications of the AML/CFT (anti-money laundering/control of financial terrorism)?
I. Senior management
II. SFA license Holders
III. Appointed Representatives
IV. The board of directorsCorrect
Board of Directors and Senior Management: financial firms must recognize and test enterprise-wide ML/TF risks, and strategies and practices provided by a particular client to assess ML/TF risks. The board of directors and senior management should therefore set a consistent risk profile in their company and build a regulatory culture.
Incorrect
Board of Directors and Senior Management: financial firms must recognize and test enterprise-wide ML/TF risks, and strategies and practices provided by a particular client to assess ML/TF risks. The board of directors and senior management should therefore set a consistent risk profile in their company and build a regulatory culture.
-
Question 15 of 30
15. Question
Which line of Defense recognizes ML/TF threats, regulates financial firms’ AML/CFT duties, and immediately informs the board of directors in case of any breaches on a regular basis?
Correct
The 2nd line of defense covers the responsibilities of the AML/CFT within the financial firms, and other roles of assistance such as risk and permanent resource management. Both functions work together to define ML/TF risks and control financial institution’s AML/CFT commitments actively. The AML/CFT compliance role should warn financial institutions’ senior management or board of directors of any violations or ML/TF threats and concerns.
Incorrect
The 2nd line of defense covers the responsibilities of the AML/CFT within the financial firms, and other roles of assistance such as risk and permanent resource management. Both functions work together to define ML/TF risks and control financial institution’s AML/CFT commitments actively. The AML/CFT compliance role should warn financial institutions’ senior management or board of directors of any violations or ML/TF threats and concerns.
-
Question 16 of 30
16. Question
From the given list of functions performed by different lines of defense, which of the following function is performed by the first line of defense only?
Correct
Business divisions (e.g. front office, customer-facing roles, and group operations) are the first line of protection in their companies’ detection, assessment, and management of ML/TF threats. In order to identify illegal activity, stringent safeguards are required and they should dedicate adequate resources to execute these functions effectively.
Incorrect
Business divisions (e.g. front office, customer-facing roles, and group operations) are the first line of protection in their companies’ detection, assessment, and management of ML/TF threats. In order to identify illegal activity, stringent safeguards are required and they should dedicate adequate resources to execute these functions effectively.
-
Question 17 of 30
17. Question
Which of the following factors must be investigated by the legal due diligence of the counsel before onboarding potential customers?
I. Substantive shortcomings in the organization and accounting system.
II. Whether the accounts were put into place accurately.
III. The identification of the ultimate and beneficial owners.
IV. The lawfulness of the possession of the properties and the running enterprises.Correct
It is important to spend a great deal of time and money on legal due diligence by lawyers on the legal issues (in particular for international companies, on the legitimacy of possession of properties and operating undertakings, on the identities of ultimate and beneficial shareholders and on the procurement of all essential registrations and licenses).
Incorrect
It is important to spend a great deal of time and money on legal due diligence by lawyers on the legal issues (in particular for international companies, on the legitimacy of possession of properties and operating undertakings, on the identities of ultimate and beneficial shareholders and on the procurement of all essential registrations and licenses).
-
Question 18 of 30
18. Question
Which of the following must be appointed to disclose additional details on the proponents, particularly if they are politically linked, besides relying on publicly accessible information when onboarding clients?
Correct
In addition to focusing on publicly accessible information, independent private investigators can be named to reveal more additional context on the proponents, in particular, whether they are politically connected, in particular on their character and ethics, and to carry out spot checks to decide if the foreign-based firms are truly worried about the real development on the spot.
Incorrect
In addition to focusing on publicly accessible information, independent private investigators can be named to reveal more additional context on the proponents, in particular, whether they are politically connected, in particular on their character and ethics, and to carry out spot checks to decide if the foreign-based firms are truly worried about the real development on the spot.
-
Question 19 of 30
19. Question
Which of the following pieces of personal/public information must be collected if the onboarding client is an individual?
I. The reputation of the company where the client works
II. Residential address
III. Occupation
IV. The risk overview of the enterprise/companyCorrect
It is necessary to get the personal information of the customer when getting information, such as age, education, residence, identity, job, family, health, and any other information that may be collected to shape any view of the client if he is an individual. This data is relevant for determining his lifestyle and whether his wealth seems to be consistent with his job and family earnings.
Incorrect
It is necessary to get the personal information of the customer when getting information, such as age, education, residence, identity, job, family, health, and any other information that may be collected to shape any view of the client if he is an individual. This data is relevant for determining his lifestyle and whether his wealth seems to be consistent with his job and family earnings.
-
Question 20 of 30
20. Question
While collecting the information about a certain client, which of the following sources of information are the most efficient and reliable?
I. Factiva
II. Newspapers
III. Grapevine
IV. Original identity documentsCorrect
Official subscribed databases and original identity documents are accurate because official databases offer compensation and guarantees of data quality. Since they are released by regulatory bodies, initial documents issued by regulatory bodies are approved. It is not appropriate to take other outlets such as newspapers, the internet, and the grapevine as precise, but should carry out more tests.
Incorrect
Official subscribed databases and original identity documents are accurate because official databases offer compensation and guarantees of data quality. Since they are released by regulatory bodies, initial documents issued by regulatory bodies are approved. It is not appropriate to take other outlets such as newspapers, the internet, and the grapevine as precise, but should carry out more tests.
-
Question 21 of 30
21. Question
Which documentation can not be used for the validation of client information if it is an international corporation?
Correct
For overseas corporations, company constitution papers, board decisions, ultimate beneficial owner’s ID documents, signatories, electability certificates & prominent positions are required. It is also necessary to decide whether there are registered or bearer securities.
Incorrect
For overseas corporations, company constitution papers, board decisions, ultimate beneficial owner’s ID documents, signatories, electability certificates & prominent positions are required. It is also necessary to decide whether there are registered or bearer securities.
-
Question 22 of 30
22. Question
If a financial institution has fair grounds to believe that a client’s resources or funds are the products of an illegal activity, as described in the CDSA, the financial institution should:
Correct
If a financial institution has fair grounds to believe that a customer’s properties or funds are the proceeds of drug trafficking or illegal activity as specified in the CDSA or are connected to the funding of terrorism, the financial institution shall not develop a contractual arrangement with the customer or perform a transaction with the customer; and shall file an STR and supply evidence with a copy to the MAS.
Incorrect
If a financial institution has fair grounds to believe that a customer’s properties or funds are the proceeds of drug trafficking or illegal activity as specified in the CDSA or are connected to the funding of terrorism, the financial institution shall not develop a contractual arrangement with the customer or perform a transaction with the customer; and shall file an STR and supply evidence with a copy to the MAS.
-
Question 23 of 30
23. Question
As per the Basel AML Index Scores & Rankings, which of the following countries are deemed to be low-risk countries?
I. Kenya
II. Cambodia
III. United Kingdom
IV. SingaporeCorrect
Different countries could be given different risk scores based on criteria such as governance, transparency, and quality of the financial industry. Some countries rated low-risk are Australia, New Zealand, Singapore, and the United Kingdom, as per the Basel AML Index Scores & Rankings.
Incorrect
Different countries could be given different risk scores based on criteria such as governance, transparency, and quality of the financial industry. Some countries rated low-risk are Australia, New Zealand, Singapore, and the United Kingdom, as per the Basel AML Index Scores & Rankings.
-
Question 24 of 30
24. Question
Examples of firms/businesses that have higher chances of being liable to higher Money laundering/financial terrorism threats exclude:
Correct
Personal investment firms, trusts, casinos and athletics-betting related companies, alternate remittance schemes and financial institutions, precious metals & diamond-related companies, cash-intensive businesses such as travel agents, betting shops, hotels, convenience shops, money changers that can combine g-proceeds are examples of companies subject to higher ML/TF risks.
Incorrect
Personal investment firms, trusts, casinos and athletics-betting related companies, alternate remittance schemes and financial institutions, precious metals & diamond-related companies, cash-intensive businesses such as travel agents, betting shops, hotels, convenience shops, money changers that can combine g-proceeds are examples of companies subject to higher ML/TF risks.
-
Question 25 of 30
25. Question
Mr A is a future buyer. He runs a trading company founded in Cambodia. He exchanges in Kenya with a colleague who’s in the precious stone business. He is a reclusive man who does not travel much and the business he uses to open the account is in Panama, and he has requested his attorney with a restricted attorney’s authority to run the account for him. What would be the risk score of this account?
Correct
In addition to Kenya and Panama, Cambodia is a high-risk region, as per the Basel AML Index Scores & Rankings 2015. His commercial practices in the business of precious stones are at high risk. If all the variables are summed up, it would have a high-risk ranking.
Incorrect
In addition to Kenya and Panama, Cambodia is a high-risk region, as per the Basel AML Index Scores & Rankings 2015. His commercial practices in the business of precious stones are at high risk. If all the variables are summed up, it would have a high-risk ranking.
-
Question 26 of 30
26. Question
Which of the following professionals establish accounts for external parties that could be gateways for financial fraud whereby the account recipient makes use of the reputation added as a front to the identity of those professionals?
I. Offshore Trustees
II. Local shipping companies
III. Attorneys
IV. AccountantsCorrect
Accountants, Attorneys, Notaries, Administrators, Offshore Trustees are the professionals who create third-party accounts that can be bribery conduits whereby the recipient of the account takes use of the reputation as a front added to the name of the accountant, advocate, notary, or trustee.
Incorrect
Accountants, Attorneys, Notaries, Administrators, Offshore Trustees are the professionals who create third-party accounts that can be bribery conduits whereby the recipient of the account takes use of the reputation as a front added to the name of the accountant, advocate, notary, or trustee.
-
Question 27 of 30
27. Question
An individual deposits an international cheque into his account for a large amount and recognizing that upon submission for clearance there will be no funds and that it takes longer for international cheques to be processed and notification of the existence of funds to be made, the person organizes for the amount against the uncleared results to be withdrawn. The process alluded to above is classified as:
Correct
A business set up by a respectable law firm can be used through “kiting”; a scheme to defraud banks. If the withdrawal is made with the funds, the UBO vanishes. He escapes by the time the bank is informed of the non-clearance of the deposited cheque, and the bank learns that the corporation is just a shell.
Incorrect
A business set up by a respectable law firm can be used through “kiting”; a scheme to defraud banks. If the withdrawal is made with the funds, the UBO vanishes. He escapes by the time the bank is informed of the non-clearance of the deposited cheque, and the bank learns that the corporation is just a shell.
-
Question 28 of 30
28. Question
When is it mandatory for financial firms to thoroughly check the identity of the client, natural persons assigned to operate on behalf of the customer, and beneficial owners of the customer?
I. After the business ties with the consumer are legally prohibited by the MAS.
II. After the due diligence checks have assured the absence of any sort of ML/FT threats.
III. Before the financial institution forms trade relations with the client.
IV. After the financial firm has executed a transaction or more than $20,000 with the client.Correct
Financial institutions shall ensure that the identity of the consumer, the natural persons named to work on behalf of the customer, and the beneficial owners of the customer is completely checked until the financial institution enters commercial relations with the customer; or before the financial institution undergoes any transaction with the customer of a value over $20,000 where the customer has no business arrangement with the customer.
Incorrect
Financial institutions shall ensure that the identity of the consumer, the natural persons named to work on behalf of the customer, and the beneficial owners of the customer is completely checked until the financial institution enters commercial relations with the customer; or before the financial institution undergoes any transaction with the customer of a value over $20,000 where the customer has no business arrangement with the customer.
-
Question 29 of 30
29. Question
Internal risk control processes and practices should be formulated and enforced by financial institutions pertaining to the circumstances under which those contractual partnerships may be formed prior to verification. They should also guarantee that the completion of verification should not surpass:
Correct
They should assure that the verification is done as quickly as fairly possible and that the completion of the verification does not extend 30 business days after business connexions have been formed.
Incorrect
They should assure that the verification is done as quickly as fairly possible and that the completion of the verification does not extend 30 business days after business connexions have been formed.
-
Question 30 of 30
30. Question
If the authentication/verification of a customer’s identity remains incomplete 120 business days after the start of a business relationship, the financial institution should:
Correct
If the authentication is not done 30 business days after the creation of the business partnership, the financial institution should cease the customer’s business relationships and withdraw from carrying out further transactions (with the exception, to the degree that this is practicable, of returning funds to their sources). The financial institution should end contractual ties with the consumer if the verification remains incomplete 120 business days after the development of business relations.
Incorrect
If the authentication is not done 30 business days after the creation of the business partnership, the financial institution should cease the customer’s business relationships and withdraw from carrying out further transactions (with the exception, to the degree that this is practicable, of returning funds to their sources). The financial institution should end contractual ties with the consumer if the verification remains incomplete 120 business days after the development of business relations.