Page 57 - 《期货和衍生品行业监管动态》(2022年合集)
P. 57

期货和衍生品行业监管动态




                       information accurate and up-to-date.

                        Amendment of client particulars


                             Request written instructions when a client asks to amend his or her

                       particulars (including updating authorised representatives), and verify the

                       requestor’s identity and specimen signature.


                             Verify email requests using contact information on LCs’ official records,

                       rather than the email address or phone number provided in the email. Consider

                       arranging a video conference or a physical meeting with the client if needed.


                             Issue acknowledgement notifications to the clients’ registered address,

                       email or mobile phone when amendments are requested and when they are made.


                        Email requests for order placing or fund transfer


                             Implement effective confirmation procedures for the requests with the
                       amounts over a reasonable threshold.


                             Rather than responding directly to email requests, use alternative

                       channels and contact information from LC’s original records to contact and verify

                       client’s requests.


                             Consider using surveillance tools to filter spoofed email addresses and

                       detect unauthorised access to internal networks and systems.


                        Red flags


                             Stay alert and handle with extra care when email requests are

                       inconsistent with the client’s normal practices. Promptly follow up irregularities,

                       such as significant payments to overseas bank accounts, requests for immediate

                       payments and repeated transfer rejections by banks.


                             Foster a strong risk culture to encourage staff to report and follow up on
                       red flags. Engage supervisors, IT administrators and compliance staff in a timely

                       manner to formulate appropriate responses to suspicious email instructions.



                   回 到 首 页                                   44                                回 到 目 录
   52   53   54   55   56   57   58   59   60   61   62