Home
KYC Administration Guide
Contents
1. Regular Processing Appendix A KYC Batches Table 8 Regular Processing Rule Name Task No As configured Description Component Id Precedence Task63 CCRCalc_CtzRsns LOAD DATA Algorithm based risk assess Task63 ment process Task64 CCRCalc_CntyHqRsns LOAD DATA Algorithm based risk assess Task64 ment process Task65 CCRCalc CntyResRsns LOAD DATA Algorithm based risk assess Task65 ment process Task66 CCRCalc CntyTaxRsns LOAD DATA Algorithm based risk assess Task66 ment process Task67 CCRCalc IndustryRsns LOAD DATA Algorithm based risk assess Task67 ment process Task68 CCRCalc OccupationRs LOAD DATA Algorithm based risk assess Task68 ns ment process Task69 CCRCalc PubCompRsn LOAD DATA Algorithm based risk assess Task69 S ment process Task70 CCRCalc_SrcWithRsns LOAD DATA Algorithm based risk assess Task70 ment process Task71 CCRCalc_LegStrcRsns LOAD DATA Algorithm based risk assess Task71 ment process Task72 CCRCalc MrktRsns LOAD DATA Algorithm based risk assess Task72 ment process Task73 CCRCalc ProdRsns LOAD DATA Algorithm based risk assess Task73 ment process Task74 CCRCalc CustCCRSmr LOAD DATA Algorithm based risk assess Task74 y ment process Task75 FN CCRCALC UPDDY TRANS Algorithm based risk assess Task75 NWT FORM DATA ment process Task76 FN CCRCALC UPDRS TRANS Algorithm based risk assess Task76 KSCORE FORM DATA ment process T
2. nS RR RO UU ere etie i et in pestem tete i tige A prr USER EROR 19 Real Time Account On Boarding Risk Assesstment 19 Regular Processing Account Opening Review nennen nennen nennen 19 Regular Processing Accelerated Review sse ettet nnne iiaia 19 Regular Processing TE 19 Peedback Application EOD Process rte densos casar aede da ceat caet anl A be EA AU rt aU 20 Periodic Maintenance dae ee gti eps ee RU E ee o E A Roth e e 20 Clearing Staging Tables Log Tables and Log Files eene 20 lastofHohdays 2u cba iic eee cene ede qeae amne p pepe ce ite ee dn 20 KYC Purging Utility ite eter ee Ene nt rente a nce ee oi eene ten iius 21 LE 21 GUS TOMO TS DER EE 21 Catch All B cket 5r anion eame ett e RR OO ete beet 21 Auto Closures 3n A A RU e See atin Ee e e Ee 21 LookbackPetiod 2 E ERR ee e ete etim tienda 22 Real Time Account On Boarding Review ssssssesseeeen eene nennen nente nennen nennen 22 Process Flow Request and Response Web Service ccccccccseseesseeeseesseessssssessseessseesssessessssessssesssacssaseseseenees 22 Stage 1 Acknowledgement Processing amp RAOR Calculation Pass 1 sse 22 JH OQOUI D EHI I TIT T qu 23 Stage 2 Third Party Information Collection sse netten nennen 23 Stage 3 RAOR Calculation Pass Zin iii nate nonna d ede eri ded i feries 24 Stage 4 Send Acknowledgement ete acras udine iier te e te t rie de rented eintreten 24 Regular PL CES oii I eee tiner
3. Text String 10 Custom2Text String 11 Custom3Text String 12 Custom4Text String 13 Custom5Text String 14 Source System String 32 KYC Administration Guide Release 2 0 End of Day Processing Chapter 2 KYC Architecture Overview Customer Risk Assessment History The KYC solution captures the history of all the risk assessments created on all the customers within a period of 12 months and would retain for x period of months 12 months is configured by default the administrator can update this parameter based on the client requirement The value can be updated from the UI for the V ATTRIBUTE1 VALUE for the KYC RISK ASSESSMENT HISTORY parameter of the Application Install Parameters A partition will be created on the table based on the value which is updated Incrementing the Processing Date The KYC solution refers to the Application Parameter KYC PROCESSING DATE to pick up the date At the end of each day this date is set to the next working date Renaming and Transferring Feedback files When a KYC review for a new account request is complete KYC informs the Account On Boarding System about the disposition of the review At the disposition of a periodic or accelerated KYC review the KYC system communicates the results of the review to the appropriate banking system used within the financial institution such as an Account Management System The parameters required for renaming and transferring feedback files sh
4. ficdb log t2t KYC12DOM 1221824179931 20121122 1 Task1 _ttl log The following table describes the log file Table 12 Table 2 Table T2T Component Description KYC12DOM This is the INFODOM on which the batch was executed 1221824179931 This is the ID of the RUN batch is created once the RUN is saved 20121122 This is the date on which the Batch was executed 1 The batch is executed for the first time on the same day Task1 This log file is for the Task1 of the batch KYC Administration Guide Release 2 0 67 File 2 Table F2T Appendix A KYC Batches File 2 Table F2T The logs for this type of task will be created in the path as follows Ofsaai Installed Area gt ficdb log dmas DS KYC12DOM 1263964041287 20121120 2 Task2 log Table 13 File 2 Table F2T Component Description DS This is a product indication for the type of log KYC12DOM This is the INFODOM on which the batch was executed 1263964041287 This is the ID of the RUN batch is created once the RUN is saved 20121120 This is the date on which the Batch was executed 2 The batch is executed for the second time on the same day Task2 This log file is for the Task2 of the batch In addition to this log the following logs and files are created for the F2T type of tasks control ftpshare KYC12DOM scripts load ACCOUNT OPEN ExtAcct DR ctl The data will be loaded into the table as per this contro
5. 0 Regular Processing Chapter 2 KYC Architecture Overview The OFS KYC requires an online batch interface to facilitate Watch List Scanning Identity Verification News Searches and so on for the successful execution of the default review The Account Opening Review is executed at the end of the day and the results are computed There will be two ways to execute the batch for Account Opening e Regular Processing on daily basis Combined batch with Re Review e Weekly Processing on weekly basis Combined batch with Re Review Accelerated Re Review Reasons There are 13 accelerated re review rules that refer to the tables in Alert Management Business schema These rules generate reasons which ultimately result in creation of risk assessments Accelerated Re Review processing refers to generation of risk assessments based on alerts created by Oracle Financial Services Alert Management system Periodic Re Review processing refers to risk assessment of the customers already risk assessed after a gap of specified time period An Accelerated KYC Review is triggered based on behaviors detected in the Oracle Financial Services Behavior Detection Framework Oracle Financial Services Behavior Detection Framework alert data is used to create a KYC tisk assessment due to re reviews rules Re Review rules processing is a batch activity The batch is scheduled after the Oracle Financial Services Behavior Detection Framework alert generation and processing ev
6. 17 Information Domains zer eret iind ie eee retro ei en e Ai rae terere ta EE 64 Figure 18 Pile Name coca eiae tame ectte ete eec de ana ce as a pA ed d eL ecce pei deter 64 Figure 19 Deployment Initiation Processing Run 65 Pigure 20 Confitmation Message iet aene teet tee e rete iet E s en dette idad 65 Figure 21 Batch Execution Map Seremi can 66 KYC Administration Guide Release 2 0 ix List of Figures x KYC Administration Guide Release 2 0 List of Tables Table 1 Table 2 Table 3 Table 4 Table 5 Table 6 Table 7 Table 8 Table 9 Table 10 Table 11 Table 12 Table 13 Table 14 Table 15 Table 16 Conventions Used 1n this Crude i eese HERE ec te e e e tnra be xiv Scheduling Batches iaa etae dae Data na ee p rec e ite fed 18 GBS ED anao dA RE ERR ete tuu tv d de edn oro Oe SA 31 Watch list Feedback mta e tmi detentus 32 Risk Assessment D tails A darn P e ee ends 32 MAC UC ss cat MC CT P 37 Functions Stored Procedures add Packages uoce tocco ii cta AA tb Seats 39 Regular a nan ann cians 41 Deployment Initiation Processing sessseeseeeeenee eene nennen tenente nennen nennen 47 End of Day Process aiii et aurea Had denote eee de ade tania ient 50 Tast of Excel Upload Templates viii va titt tee ire ed erre ene e eer eas 51 Table 2 Table CEQ EE EE 67 Fil amp 2 Table B2 Too eicere eere pacem a m pde pa a a t een 68 Shellscript Transform data tinca 69 Table 2 Eile Extraciomot Da
7. For more information about Oracle Financial Services KYC refer to the following documents e Enterprise Case Management User Guide e KYC Risk Assessment Guide e Configuration Guide e Installation Guide Stage 1 e Installation Guide Stage 3 e Services Guide To find additional information about how Oracle Financial Services solves real business problems see our website at www oracle com financialservices Conventions Used in this Guide Table 1 lists the conventions used in this guide Table 1 Conventions Used in this Guide Convention Meaning Italics eNames of books chapters and sections as references eEmphasis Bold eObject of an action menu names field names options but ton names in a step by step procedure eCommands typed at a prompt eUser input Monospace eDirectories and subdirectories eFile names and extensions eProcess names eCode sample including keywords and variables within text and as separate paragraphs and user defined program elements within text Variable Substitute input value xiv KYC Administration Guide Release 2 0 CHAPTER 1 KYC Architecture Overview This section provides a brief overview of the Oracle Financial Services KYC architecture and operations This chapter focuses on the following topics About Oracle KYC Architecture e OFSAAT Architecture e Deployment View About Oracle KYC Architecture Oracle Financial Services Know Your Custome
8. Guide Release 2 0 33 End of Day Processing Chapter 2 KYC Architecture Overview Utility for Purging KYC data structures are populated through Default Review Processing Accelerated Review Processing Re Review Processing and Deployment Initiation Processing Over a period of time this data volume will grow and the application Administrator will need to purge data from the production systems after archiving This utility helps the application Administrator to purge data from the Risk Assessment tables based on the purge requirement Archival is not done by this utility Required backup and archiving of the database and tables must be done outside this utility The utility will take number of days as input for the retention period for the Auto closed risk assessments and the number of days as input for the retention period of the UI closed risk assessments The administrator should update a whole number in the V ATTRIBUTE2 VALUE and V_ATTRIBUTE5_VALUE respectively in the VW APPLN PARAMS table for the KYC PURGE ARCHIVE PARAMTERS parameter The utility will also take the range of the CER score as another input during the purging of the risk assessments The Administrator can update the minimum and maximum range of the CER score in the V ATTRIBUTES VALUE and V_ATTRIBUTE4 VALUE columns of the VW APPLN PARAMS table for the KYC PURGE ARCHIVE PARAMTERS parameter Purge utility is defined as a data transformation in OFSAAI and it is a part of
9. and the relevant risk score is used There are three possible scenarios as described below that can be encountered during the calculations e Data is available but the equivalent entry is non existent in the dimension mapping jurisdiction table Here the default risk score stored in the Others category is used for the calculation e Data is available and an equivalent entry is present in the dimension mapping jurisdiction table The appropriate risk score is used in the calculation e Data is not available As a result the risk score cannot be identified As a result dynamic weight calculation is used to calculate the correct risk score Since the weight for a valid parameter is less than 100 the risk assessment engine increases the weight and the related tisk scores that the newly calculated weight equals 100 This ensures that at the time of the risk assessment the over all weight for the valid parameters is always 100 and the risk score is proportionately incremented For more information refer to the KYC Risk Assessment Guide End of Day Processing Feedback to the Oracle Financial Services Behavior Detection Framework Account Opening System At the end of each day risk scores for risk assessments that are auto closed or closed by the compliance officer after investigation are sent to Oracle Financial Services Behavior Detection Framework and the Account Opening System through Feedback files Watch List files and Feedback files to t
10. based on the customer type The related information is updated in the Risk Assessment Summary Risk Assessment Reasons Customer Review and Account Review tables Stage 4 Send Acknowledgement The system creates the return acknowledgement XML and returns to the Account On Boarding System Regular Processing The Default Account Review workflow should be triggered upon request from the following external account opening system The batch is split into the following sections e Accelerated Re Review Reasons e Customer Identification m New Customer Identification 7 Identifying the customers whose status are cleared from Hold 7 Identifying the customers based on accelerated re review rules 7 Identifying the customers based on re review date e Risk Assessment Creation Primary Guardian Joint Account Holders Master Customer and Account Table Maintenance Copy Snapshot From Oracle Financial Services Behavior Detection Framework Bus Schema for all the risk assessments created e Registration Information Flag and Request for Latest Information e Watch List Scanning Request Response e Document Verification e ID Verification Request Response Negative News Search Request Response Including the Documents e Risk Assessment Initiation m Rule based Risk Assessment m Algorithm based Risk Assessment e Closure Updates Promote to Case e Customer Risk Assessment History population 24 KYC Administration Guide Release 2
11. based on the type of documents provided by the customer Task37 DocumentVerificationAc LOAD DATA Log action for Document Verifica Task37 tion tion scanning Task38 CreateldvReq LOAD DATA Create request for Identity verifi Task38 cation processing for all the risk assessments Task39 IDV_Invoke TRANS Invoke the external third party Task39 FORM DATA service for all the requests cre ated and load the data in the results table Task40 LogldvAction LOAD DATA Log action for Identity verification Task40 scanning Task41 CpySnpCustCtz LOAD DATA Copy snapshot of the customer Task41 citizenship for the risk assessed customer Task42 CpySnpAcctMnts LOAD DATA Copy snapshot of the customer Task42 KYC Administration Guide Release 2 0 43 Regular Processing Appendix A KYC Batches Table 8 Regular Processing Rule Name Task No As configured Description Component Id Precedence Task43 CpySnpCustSrcWith LOAD DATA Copy snapshot of the customer Task43 source of wealth for the risk assessed customer Task44 CpySnpAcctRoleMnts LOAD DATA Copy snapshot of the Role of Task44 customer on account for the risk assessed customer Task45 CpySnpCustRelMnts LOAD DATA Copy snapshot of the customerto Task45 customer relationship for the risk assessed customer Task46 CpySnpCustCntyMnts LOAD DATA Copy snapshot of the customer Task46 country for the risk assess
12. deett ists 1 ORSAAT Arteta 2 Deployment View i i detresse 5 CHAPTER 2 KYC ODeGralloHs o ote bias a een s 7 Application Over vie wirss D iria e 7 EXE Mods A dede dE 9 User Review ve ET aca 12 IN M 13 Were Mo T 13 Initial 7 Onectime ACylties e eee d eo e eR E dre eee dt te la eo ee 13 RE 14 Petiodic Maintenance A chiviti sis sfc nities eee etit eset Le RR T td 14 Initial One tme Activities n a e e reed A ee eden dla n E tte e D 14 ManaetngveU Sets iia a A E AAA ge RH EE 14 Excel Upload Process talar 15 Configuring Application Parameters edett mettere eter inde erste dite Pei d eed 15 Configuring Application Installation Parameters een enne nennen 15 Configuring Rule Based Risk Parameters EE 16 Defining the Re Review Risk Thresholds EE 16 Configuring Algorithm Based Risk Parameters eene 16 Defining Score for Values in KYC Risk Assessment eene een eene 16 Settine up Document Guidelines A d n don re ential 17 E Funds Factiva Specific Pre requisites ui AA AAA IATA 17 Setting up KYC Real Time Service Request AAEN EEE AS EE E EE ia 17 Scheduling KYC Batches eant tib tied data 17 Listing Holidays in the OFSAAI Administration User Interface sse 18 KYC Administration Guide Release 2 0 V Contents Deployment Initiation Processing Based on the Implementation Requirement sse 18 Daily Activites
13. internal document verification process happens before the external identity verification is triggered to collect data for the risk assessment process The guidelines for verification should be set up as a start up activity The guidelines must be entered in the Excel template available at ftpshare STAGE ExcelUpload KYCLookupTables FCT DOCS GUIDELINES XLS in the ficapp layer Upload the details through the Excel upload activity E Funds Factiva Specific Pre requisites Oracle Financial Services Know Your Customer is integrated with external third party services for enhanced due diligence KYC is also integrated with E Funds for Identity Verification The KYC Administrator can update the required configuration for identity verification from the UI KYC is integrated with Factiva for Negative News Search The KYC Administrator can update the required configuration for identity verification from the UI For more information refer to the Configuration Guide Setting up KYC Real Time Service Request KYC has a feature called Real Time Account On Boarding Risk RAOR This captures the details of a customer and interested parties during the time of account opening and calculates the risk of that customer Update the KC XSD LOC parameter in the APPLN INSTALL PARAMS table through the Configuration option This parameter specifies the path of XSD files which are required for the application Scheduling KYC Batches The batches will not be vi
14. the Configuration Guide OFSAAI Related Configuration The OFSAAI allows you to perform the following tasks e Incremental model changes m Add No Impact m Modify Data dependency dictated by the back end DB and manual un mapping and mapping of metadata m Delete Data dependency dictated by the back end DB and manual un mapping and mapping of metadata e ETL Changes m Add m Change m Delete e Definition of Excel Upload mapping to push data into the Database e Files and tables based on Source Data Definition Metadata Data Maintenance m Add m Modify m Delete KYC Administration Guide Release 2 0 53 OFSAAI Related Configuration Appendix C Configurability Operations Administration m Batch Scheduling flexibility m Hold or delete tasks from the batch For Example Insert Update Rules Custom Executable and Procedures m Changes to User or User Group Function and Role definitions and mapping e Uland Workflow Maintenance Note Changes to UI and workflow definitions requires knowledge of OFSAAI specific editors in addition to the knowledge of OFS KYC and the OFSAAI The following figure displays mapping used to push data into the application Database periodically Data Integrator Process Flow Application Seurce jl f Source Model 3 Acquisition g J Z Services Excel Defi System 2 Requirements Source Source dl d System 1 System 3 E d Data Modeling f j
15. the EOD processing and the Regular Processing batches The Purging of the Risk assessments can be done based on Jurisdiction also ALL is configured by default as the jurisdiction parameter the risk assessments related to all the jurisdictions will be purged by default In order to purge only risk assessments related to a particular jurisdiction the Administrator must update the specific jurisdiction code in the V_ATTRIBUTE1_VALUE of the vW APPLN PARAMS table for the KYC PURGE ARCHIVE PARAMTERS parameter Purging Risk Assessment Related Tables Accept the number of days for the retention period and the risk range as parameter Delete the dependent records first and then the required records Delete data from the following tables that are older than the given date in the order specified below 1 FCT REREVIEW RA REASONS FCT RA CUSTOMERS FCT RA ACCOUNTS FCT RA ACCT CUST ROLES FCT RA CUST RELATIONSHIPS FCT RA CUST ADDRESSES FCT RA CUST COUNTRY FCT RA CUST CITIZNSHPS FCT RA MARKEIS SERVED FCT RA PRODUCIS OFFERED So Sr E ib Ro eS k FCT RA CUST PHONES FCT RA CUST SRC WEALIH DTLS m 34 KYC Administration Guide Release 2 0 End of Day Processing Chapter 2 KYC Architecture Overview 13 14 15 16 17 18 19 20 21 22 23 FCT_RA_DOC_VERF_DTLS FCT_RA_ACTIONS FCT_TP_IDV_REQUESTS FCT TP WLS REQUESTS FCT TP WLS RESULIS FCT TP NNS REQUESTS FCT TP NNS RESULIS FCT RA RISK RATING S
16. the parameter Risk Values m Related Documentation revision Modification to the Pre configured Risk Models Slight Change in Logic m Enhancing changing the filter condition require all the steps mentioned above except changes to the DM and related changes Additions to Pre Configured Re Review Processing m Additional derived entity definitions based on the Oracle Financial Services Alert Management System m Complete knowledge of how the system is designed Data Model Knowledge for Re Review processing m Re Review Processing is configured using the OFSAAI Rules FW Creation Modification of Type 1 Rules m Revision to Join as applicable m Filter correction to remove or add an additional filter m Mapping of columns KYC Administration Guide Release 2 0 57 Application Configuration using OFSAAI Configurability Appendix C Configurability e Creation Modification of Type 2 and 3 Rules Classification and Computational Rules Revision to Process Tree to add modify tasks and task sequence Revision to the run definition UI for maintaining the Re Review Rules and parameters Related Documentation revision e Changes to Pre Configured Re Review Processing Models Slight Change in Logic Enhancing or changing the filter condition requires all the steps mentioned above except changes to the DM and related changes e Process Flow Changes All batch workflows Default Review Re Review Feedback Processing
17. xls MAP LGLSTRUC OWNRSHP JRSD CN xml MAP MARKETS SERVED JRSDC N MAP MARKETS SERVED JRSDON xls MAP MARKETS SERVED JRSDON xml MAP NNS RANGE JRSDCN MAP NNS RANGE JRSDON xls MAP NNS RANGE JRSDCN xml MAP OCCUPATION JRSDCN MAP OCCUPATION JRSDON xls MAP OCCUPATION JRSDON xml MAP PRODUCT JRSDOCN MAP PRODUCT JRSDON xls MAP PRODUCT JRSDON xml MAP RELN PERIOD RANGE JR SDCN MAP RELN PERIOD RANGE JRSD CN xls MAP RELN PERIOD RANGE JRSD CN xml VW APPLN PARAMS VW APPLN PARAMS xls VW APPLN PARAMS xml VW APPLN REREVIEW PARAMS VW APPLN REREVIEW PARAMS xls VW APPLN REREVIEW PARAMS x ml VW APPLN RISK RATING PARA MS VW APPLN RISK RATING PARAMS xls VW_APPLN_RISK_RATING_PARAM S xml FCT DOCS GUIDELINES FCT DOCS GUIDELINES xls FCT DOCS GUIDELINES xml 52 KYC Administration Guide Release 2 0 APPENDIX C Configurability This chapter discusses the following topics e Application Related Configuration e OFSAAT Related Configuration e Application Configuration using OFSAAI Configurability Configurability of the OFS KYC can be categorized in the following ways Application Related e OFSAAI Related Application Related Configuration KYC risk assessments requires some inputs from application parameters and installation parameters which can be defined by the admin user from the user interface For more information refer to
18. ANSFORM Task51 PRIOR cess DATA Task53 FN CLOSUREUPD RALAS Algorithm based risk assessment pro TRANSFORM Task52 TDATE cess DATA Task54 FN CLOSURE UPDATES Closure updated for the risk assess TRANSFORM Task53 ments crated DATA Task55 LogModelBasedAction Log action for Algorithm based risk LOAD DATA Task54 assessment process Task56 FN RA TO CASE Promotion of the Risk assessment to TRANSFORM Task55 a Case DATA Task57 Auto Case Assignment Invoking the Auto Case Assignment TRANSFORM Task56 process of Oracle Financial Services DATA Behavior Detection Framework for assigning the cases to the users Task58 FN POST CASE ASSIGNM Updating the details of the cases after TRANSFORM Task57 ENT the case assignment process is com DATA plete Task59 FN CUST RA HISTORY Population of the data related to the TRANSFORM Task58 Risk assessments created for the cus DATA tomer into the History table Task60 FN PRCNG ACT DATA LO Movement of the data from the Pro TRANSFORM Task59 AD cessing table to the Actual tables after DATA the Risk assessment process KYC Administration Guide Release 2 0 49 End of Day Processing Appendix A KYC Batches End of Day Processing Table 10 End of Day Processing Task No Rule Name As configured Description Component Id Precedence Task1 GenCustDetails ED Extract the customer feedback EXTRACT details DATA Task2 GenWLSFeedback_ED Extract the Watchlist scanning EXTRACT Task1 feedback deta
19. Applications Se ae ee ae Dei we i rket SOX General Admin amp Baselli Loss Data RCSA een Geet Compliance Configuration Platform End User o ood OFSXA r k m Y Service Workflow Reports Framework Web Services Framework Tracing abstractions Presentation Services Visualization and Feature RichWebtop BPEL Process Orchestration OFSAAI Frameworks L E al AA a Cube Analysis OFSAAI Metadata Fine amp Coarse grained Framework amp Run Time Environment File based ETL Business Data Model Web Services Data Interface Specification o Alert Management Doc Management Asynch amp Real Time Events we Third Party Services API Specification E Security Infrastructure mA eee ka Unix and Windows Figure 2 OFSAAI Solution Architecture The following figure shows the primary communications links and protocols used between processing nodes KYC Administration Guide Release 2 0 OFSAAI Architecture Chapter 1 KYC Architecture Overview Browser client https http over SSL Multi tier OFSAAI Architecture Physical JNDI JDBC Application Oracle TCP IP sock stream Atomic schema OFSAAI Information domain Database Buual e j020 01g 10 98 1314 HO 5134138 3107 Computational Tier Figure 3 Communication Links and Protocols 4 KYC Administration Guide Release 2 0 Deployment View Chapter 1 KYC Architecture Overview Deployment View The followin
20. Each Real Time Request contains only the account opening information for one account per request If the customer opens a savings and a checking account the account opening system should send two requests to KYC for RAOR processing one for the savings account and one for the checking account A single request will not contain more than one customer s account opening details per request Interested party definitions defined for the request will only be used for RAOR calculations The request generates the Request ID from the Sequence The request ID and real time customer ID and account ID are stored in variables This information is required to process the specific request through the following stages e Stage 1 Acknowledgement Processing and RAOR Calculation Pass 1 e Stage 2 Third Party Information Collection e Stage 3 RAOR Calculation Pass 2 e Stage 4 Send Acknowledgement Stage 1 Acknowledgement Processing amp RAOR Calculation Pass 1 The following steps should be handled in Task 1 Init Check e Existing Customer Real Time Customer Risk Assessment Processing This registers the request and the Request ID Customer ID and Account ID which are the factors that uniquely identify the request The requested XML is parsed and data is inserted along with the Request ID in respective Staging tables Data is dumped into the following staging tables Fct Customers Stg Fct Cust Addresses Stg Fct Cust Phones Stg Fct Cust Rela
21. FSAAI Configurability 56 KYC Administration Guide Release 2 0 Application Configuration using OFSAAI Configurability Appendix C Configurability Application Configuration using OFSAAI Configurability Note Web Service Call Real Time Account On boarding Risk m Data model changes as applicable to add an additional column or table m Revisions to Service Guide m Request and Response template corrections related to the Third Party service m Communication with the Source systems regarding the revisions of request and response formats m Testing of the revised request and response Additional Risk Models Risk Parameters m Data model changes as applicable to add an additional columns or tables m Changes to File Based Data Ingestion Web Service based Ingestion as explained above m Complete knowledge of how the System is designed Data Model Knowledge The Risk Assessment Module is configured using the OFSAAI Rules FW Creation Modification of Type 1 Rules m Revision to Join as applicable m Filter correction to remove or add an additional filter m Mapping of columns Creation Modification of Type 2 and 3 Rules Classification and Computational Rules m Revision to Process Tree to add modify tasks and task sequence m Revision to the run definition m Revision to the configurable values such model code model parameter Risk Weight m UI for maintaining the Risk modes and Risk Parameters m UI for maintaining
22. LOAD DATA Task22 vided by the customer for the risk assessed customer Task24 LogSnapshotAction Log action for snap shot LOAD DATA Task23 Task25 FN RB PROCESSING Rule based risk assessment process TRANSFORM Task24 DATA Task26 CCRCalc CIP Dis Algorithm based risk assessment pro LOAD DATA Task25 cess Task27 CCRCalc CIP PC Algorithm based risk assessment pro LOAD DATA Task26 cess Task28 CCRCalc CIP IP Algorithm based risk assessment pro LOAD DATA Task27 cess Task29 CCRCalc WLS Dis Algorithm based risk assessment pro LOAD DATA Task28 cess Task30 CCRCalc WLS PC Algorithm based risk assessment pro LOAD DATA Task29 cess Task31 CCRCalc WLS IP Algorithm based risk assessment pro LOAD DATA Task30 cess Task32 CCRCalc_RelshpRsns Algorithm based risk assessment pro LOAD DATA Task31 cess Task33 CCRCalc_CorpAgeRsns Algorithm based risk assessment pro LOAD DATA Task32 cess Task34 CCRCalc_CntyOprRsns Algorithm based risk assessment pro LOAD DATA Task33 cess Task35 CCRCalc CtzRsns Algorithm based risk assessment pro LOAD DATA Task34 cess Task36 CCRCalc_CntyHqRsns Algorithm based risk assessment pro LOAD DATA Task35 cess Task37 CCRCalc_CntyResRsns Algorithm based risk assessment pro LOAD DATA Task36 cess Task38 CCRCalc_CntyTaxRsns Algorithm based risk assessment pro LOAD DATA Task37 cess Task39 CCRCalc_IndustryRsns Algorithm based risk assessment pro LOAD DATA Task38 cess Task40 CCRCalc_OccupationRsns A
23. ODUCT DIM PRODUCT xls DIM PRODUCT KC vm DIM RAORRISK CATEGORY DIM RAORRISK CATEGORY xls DIM RAORRISK CATEGORY xml DIM RA PRIORITY DIM RA PRIORITY xls DIM RA PRIORITY xml KYC Administration Guide Release 2 0 51 Excel Upload Templates Appendix A KYC Batches Table 11 List of Excel Upload Templates Table Name Excel Upload Template Excel Mapping Name DIM_RA_SOURCE DIM_RA_SOURCE xls DIM RA SOURCE xml DIM RELATIONSHIP TYPE DIM RELATIONSHIP TYPE xls DIM RELATIONSHIP TYPE xml DIM RELN PERIOD RANGE DIM RELN PERIOD RANGE xls DIM RELN PERIOD RANGE xml DIM RISK CATEGORY DIM RISK CATEGORY xls DIM RISK CATEGORY xml DIM STATUS DIM STATUS xls DIM STATUS KYC xml DIM TAX IDENT FORMAT DIM TAX IDENT FORMAT vis DIM TAX IDENT FORMAT xml DIM WLS FEEDBACK DIM WLS FEEDBACK vie DIM WLS FEEDBACK xml MAP COMPANY TYPE JRSDCN MAP COMPANY TYPE JRSDON xls MAP COMPANY TYPE JRSDCN xm MAP_CORP_AGE_RANGE_JRSD CN MAP_CORP_AGE_RANGE_JRSDCN xls MAP_CORP_AGE_RANGE_JRSDCN xml MAP COUNTRY JRSDCN MAP COUNTRY JRSDON xls MAP COUNTRY JRSDOCN xml MAP INCOME SROC TYPES JRS DCN MAP INCOME SRC TYPES JRSDC N xls MAP INCOME SRC TYPES JRSDC N xml MAP INDUSTRY JRSDOCN MAP INDUSTRY JRSDON xls MAP INDUSTRY JRSDON xml MAP LGLSTRUC OWNRSHP JR SDCN MAP_LGLSTRUC_OWNRSHP_JRSD CN
24. ORACLE Know Your Customer Administration Guide Rekase 2 0 September 2013 ORACLE FINANCIAL SERVICES Know Your Customer Administration Guide Release 2 0 September 2013 Document Control Number 9MN12 62110024 Document Number AG 13 K YC 0001 2 0 03 Oracle Financial Services Software Inc 1900 Oracle Way Reston VA 20190 Document Number AG 13 K YC 0001 2 0 03 Third Edition September 2013 Copyright O 2013 Oracle and or its affiliates All rights reserved Printed in U S A No part of this publication may be reproduced stored in a retrieval system or transmitted in any form or by any means electronic mechanical photocopying recording or otherwise without the prior written permission Trademarks Oracle is a registered trademark of Oracle Corporation and or its affiliates Other names may be trademarks of their respective owners Oracle Financial Services Software Inc 1900 Oracle Way Reston VA 20190 Phone 703 478 9000 Fax 703 318 6340 Internet www oracle com financialservices Contents Re e TE ix LIST Ero me ced a rac aes cates a cael vaca M xi About TIS E xiii Who Should Use AC xiii How thts Guide 1s Organized eee reet de ee A e m e ee xiii Where to Find More Information eet e ed eint i terea dai xiv Conventions Usedan this Guide zarate A cis ea duane ees e red pert xiv CHAPTER 1 KYC Architecture Overvieu 1 About Oracle KYC Architecture eei rtr etes edt s te
25. PPLN RB PROCESSING xml APPLN REREVIEW PARAMS APPLN REREVIEW PARAMS xls APPLN REREVIEW PARAMS xml APPLN RISK RATING PARAMS APPLN RISK RATING PARAMS xls APPLN RISK RATING PARAMS xml DIM ACCOUNT TYPE DIM ACCOUNT TYPE xls DIM ACCOUNT TYPE xml DIM ACCT CUST ROLE TYPE DIM ACCT CUST ROLE TYPE xls DIM ACCT CUST ROLE TYPE xml DIM ACTION DIM ACTION xls DIM ACTION KYC xml DIM ADDRESS TYPE DIM ADDRESS TYPE xls DIM ADDRESS TYPE KYC xml DIM CITIZENSHIP STATUS DIM CITIZENSHIP STATUS xIs DIM CITIZENSHIP STATUS xml DIM COMPANY TYPE RISK DIM COMPANY TYPE RISK xls DIM COMPANY TYPE RISK xml DIM CORP AGE RANGE DIM CORP AGE RANGE xls DIM CORP AGE RANGE xml DIM CTZNSHP STATUS DOC V ERF DIM CTZNSHP STATUS DOC VERF xls DIM CTZNSHP STATUS DOC VER F xml DIM DOCUMENT TYPE DIM DOCUMENT TYPE xls DIM DOCUMENT TYPE KYC xml DIM INCOME SRC TYPES DIM INCOME SRC TYPES xls DIM INCOME SRC TYPES xml DIM INDUSTRY DIM INDUSTRY xls DIM INDUSTRY KYC xml DIM LGLSTRUC OWNRSHP RIS K DIM LGLSTRUC OWNRSHP RISK xl S DIM LGLSTRUC OWNRSHP RISK x ml DIM MARKETS SERVED DIM MARKETS SERVED xls DIM MARKETS SERVED xml DIM NEG NEWS RANGE DIM NEG NEWS RANGE xls DIM NEG NEWS RANGE xml DIM OCCUPATION DIM OCCUPATION xls DIM OCCUPATION KYC xml DIM PHONE TYPE DIM PHONE TYPE xls DIM PHONE TYPE xml DIM PR
26. Parameters Initially the default values for the application parameters are to be populated into the database DB during Excel upload The parameter values can be modified in the Excel data files before the upload process is done This can be fine tuned through the User Interface provided by logging into the system as the KYC Administrator The entries in the Application Parameters Appln_Params ate used to control the flow of the application These parameters are Jurisdiction specific and must be populated for each jurisdiction in the Vw_Appln_Params table The values of these parameters will have an impact on the various services invoked by the solution and the work flow of the solution Multiple entries can be made for each parameter one for each jurisdiction It is mandatory that one set of parameters is present in the Application Parameters for the Jurisdiction DEFAULT which is pre packaged and installed as part of application installation For more information on how to navigate the UI and populate values for all jurisdictions refer to the Configuration Guide Configuring Application Installation Parameters The values for the Application Installation Parameters are to be populated into the DB during Excel upload The parameter values can be modified in the Excel data files before the upload process is complete or can be fine tuned through the UI by the KYC Administrator The Application Installation Parameters contain information about ins
27. RF_TIME_PERIOD then the risk assessment status is changed to HOLD Subsequently the Registration Information updation required Flag is set to Y in Fct_ra table The risk assessments which are in HOLD status will be visible only to the user who is mapped to the Relationship manager role When the relationship manager verifies the customer information and updates the risk assessments assigned to him as Verified Entity Info is Recent in the UI it will set the Registration Information updation required Flag back to N Meaning the customer s information is updated and new set of data relevant to the risk assessment can be picked up from the Business schema If the Relationship Manager verifies the customer information and finds that the information available is the latest he will update the risk assessment as Verified No change required it will set the Registration Information updation required Flag to NA then the old snapshot information is retained and used for further processing Note The system assumes that the information has been updated in the source system Watch List Scanning The risk assessed customers and interested parties are checked against a list of closely monitored individuals and entities by carrying out a Watch List scan This is done to identify the existing and prospective customers whose names have already been put up on the Watch List The OFAC result and score obtained as a part of Identity Verification are also used f
28. RR LOAD DATA Reasons based on alerts gener ated in Oracle Financial Services Behavior Detection Framework Task6 Task7 RvwHighScoreCust RR LOAD DATA Reasons based on alerts gener ated in Oracle Financial Services Behavior Detection Framework Task7 Task8 RvwHighScoreAcct RR LOAD DATA Reasons based on alerts gener ated in Oracle Financial Services Behavior Detection Framework Task8 Task9 RvwCustStateChg RR LOAD DATA Reasons based on change log summary in Oracle Financial Ser vices Behavior Detection Frame work Task9 Task10 RvwAcctStateChg RR LOAD DATA Reasons based on change log summary in Oracle Financial Ser vices Behavior Detection Frame work Task10 KYC Administration Guide Release 2 0 Regular Processing Appendix A KYC Batches Table 8 Regular Processing Rule Name Task No As configured Description Component Id Precedence Task11 RvwCustCntyChg_RR LOAD DATA Reasons based on change log Task11 summary in Oracle Financial Ser vices Behavior Detection Frame work Task12 RvwAcctCntyChg RR LOAD DATA Reasons based on change log Task12 summary in Oracle Financial Ser vices Behavior Detection Frame work Task13 RvwOCustCtzChg RR LOAD DATA Reasons based on change log Task13 summary in Oracle Financial Ser vices Behavior Detection Frame work Task14 RvwIncC
29. UMMARY FCT TP RISK RATING DETAILS FCT RA RISK RATING REASONS FCT RA KYC Administration Guide Release 2 0 35 End of Day Processing Chapter 2 KYC Architecture Overview 36 KYC Administration Guide Release 2 0 CHAPTER 3 Views Know Your Customer uses many Oracle database view definitions to process risk assessments The following table provides a high level description of the views Table 6 Views View Description VW_DOCS_VERF_CUST_LIST This view identifies the list of customers who are eligible for Mandatory Document Verification VW_IDV_REQUESTS This view provides the consolidated list of customers for whom third party ID verification should be initiated USRGPMAP This view is used to show the mapping data of user and user group CSSMS_HOLIDAY_LIST This view fetches the Holidays which the bank administrator has entered FCT CUST ACCT DOCS This view is created on the CUST ID DOC table of the Business schema The view will display the type of documents each customer has provided during the account opening process VW BUS LATEST ACCT This view gets the date of the latest account of a customer KYC Administration Guide Release 2 0 Chapter 3 KYC Architecture Overview 38 KYC Administration Guide Release 2 0 CHAPTER 4 Functions Stored Procedures and Packages Know Your Customer uses many Oracle functions and stored procedure definitions to
30. YC Administration option in the UI for the parameter KYC_PROCESSING_DATE For more information refer to the Enterprise Case Management User Guide Real Time Account On Boarding Risk Assessment Processing the online request from the Account On Boarding system assists in the account opening process The Real Time Account On Boarding Risk Assessment RAOR workflow is triggered by the request from the external account opening system This returns a risk score to the external account opening system The request and response is sent as a Web Service Request Regular Processing Account Opening Review Data for the Account Opening Review System is picked from the ECM application database All the accounts which were opened the previous x days and are in Active status will be picked for risk assessment The accounts which were opened in the last 7 days and activated the previous day will also be selected The look back period is set to 7 days by default but the value can be modified based on the requirement The Account Range for Regular Processing parameter can be modified from the Application Parameters UI screen under the KYC Administration option by the KYC Administrator For more information refer to the Enterprise Case Management User Guide Regular Processing Accelerated Review Accelerated Review depends on the alerts generated by the Oracle Financial Services Alert Management system at EOD or due to changes in customer and account informati
31. a Web site OFSAAI Oracle Financial Services KYC solution is pre configured to interact with Factiva for Negative News Search Risk Assessment Initiation Based on the reasons generated in the previous module risk assessments are created for the corresponding customers The type of risk assessment source is specified as Accelerated Re Reviem Then the next Re Review Date for each customer is compared to the day s processing date If the two match then a risk assessment is created for the customer with the risk assessment source specified as Periodic Re Reviem KYC Administration Guide Release 2 0 27 Regular Processing Chapter 2 KYC Architecture Overview Rule based Risk Assessment Rule based assessment calculates a CER score based on client configurable rules Rule based assessment model is executed only if it is chosen by the bank or FI for an installation This option can be decided using the Rule based assessment parameter available in the jurisdiction specific Application Parameters table For more information about the Rule based assessment model parameters refer to the Configuration Guide Rule based assessment model supports a business process framework which allows the bank or FI to provide different values for the pre defined rules Once a customer is assessed using the Rule based Assessment Model they will not be assessed further using Algorithm based Assessment Model For Rule based assessment the values for each rule a
32. above Promote to Case During Risk Assessment Promotion to Case there are possibilities of few risk assessments not being promoted to case which can be because of non availability of data system issues server problems etc The error for the Risk Assessment not being promoted to a case will be captured in the table RA TO CASE ERROR This table will be available in the KYC Atomic schema The user should be able to identify the cause of the error and resolve the same Once the error is rectified these Risk Assessments will be promoted to a case during the next KYC batch processing Deployment Initiation Processing This batch is to be executed only once at the time the KYC solution goes live All the sections listed under this batch are part of the Re Review Processing Batch also The batch is split into the following sections e Customer identification for Risk Assessment e Tagging data to the cases e Watch List scanning e Risk Assessment Auto Closure Promote to Case Customer Risk Assessment History population Refer to the similar sections in Re Review Processing for description of each of the sections Risk assessment process for the existing customers is done based on the following e Jurisdiction Oracle Financial Services client can process the deployment workflow based on specific jurisdiction Customer Type Oracle Financial Services client can also process the data based on customer type e Length o
33. acta BB eneit j entis B uenis Dette Exirset 202 Ne a ComateS oPecct A B cuestan IB conesca D Create Ratt E B cuernos n B cresteSeotucat te D Cate cco A B conste P B Cima Serena A B cesse n AA AAA B ceste B cuencem n B cerise 02 n Crema amen E B coe IB cinese B eacus D faece DW B oma tc CN CEET B m eg pi B conso m B eoi B er th caccteniert IR D hayani ot B eem B rtAti te T B sico cn Extras pame e Fee Te it Webpaze Dialing apa Extract bettie Proper Citir Panen Properties fren amm Tei tener Dea Fae L TUST ee ROUND FC CUST RYTETLS S CVs in Sect ral Sor Burg EratorZD ala nst Sert Teen nas fun tte fe Canton Thee awe tae nl Cartas Rea tal Tra fues aem itte Orta file re murrater Dam Bowes Teati Dec Sun Beta 31 Ciod Sum FCT_CIST_RVADT v Cue MES as Mectze Master ez Dan m er T eng Ortar Figure 15 Extract Properties 4 Click Properties A pop up window opens and lists the properties of the extraction 5 Set the required delimiter and save the extraction KYC Administration Guide Release 2 0 61 Extraction Appendix C Configurability 62 KYC Administration Guide Release 2 0 APPENDIX E Resaving Runs The Oracle Financial Services KYC defines the following runs e Deployment Initiation Processing e Regular Proces
34. ad Process The Excel upload process inserts the data into the appropriate dimension tables based on the pre configured Excel upload definitions installed as part of the application installation The Excel upload process will fail if there are primary key violations at the time of upload When uploading additional parameter values and associated risks only the incremental records should be maintained in the Excel template with the correct unique identifier key The data in the Excel templates may refer to the data directly and the codes that are used to reference the data in a different dimension table Referring to the incorrect reference code will lead to an unsuccessful upload process While populating data into Dim_Jurisdiction table through the Excel Upload activity note that jurisdiction D is to be retained D Default code is to be retained as it contains Default values which is required for risk processing if the data is not provided Note e In order to enable or disable accelerated re review rules the admin can modify the value of the column F ENABLE in the excel sheet VW_APPLN_REREVIEW_PARAMS to Y or N respectively Then the admin can proceed with the excel upload process e Jurisdiction codes in KYC 2 0 should match with jurisdiction codes in kdd jurisdiction table in alert management schema Data should be uploaded into the tables in the order mentioned in Appendix B Excel Upload Templates on page 51 Configuring Application
35. are configured using the OFSAAI Rules FW These steps must be executed depending on the type of change 58 KYC Administration Guide Release 2 0 APPENDIX D Extraction Definition This chapter discusses the following topics e Extraction Extraction To set the delimiter used in the extraction files follow these steps 1 Log in as a KYC Administrator 2 Navigate to the following path Unified Metadata Manager Technical Metadata Management Data Integrator Source Designer Define Extracts 3 Select and open the extraction from the list KYC Administration Guide Release 2 0 59 Extraction Appendix C Configurability Ostatase Cotracts n Crenein C uarie p Seatricyt n Cenaa Lauer D Creates Pec A BB cromernereceansen m CresteG c facal m A e PL O Gedefroftzzcr a batract Katia Le Ls D Source Mgr Coamn cio A ER E B oue a nun B cuoi n B cuenten D CeesSniPEra P D Crate n aston Pn vice E ndi munt iuc st Bra ap 5B Dec CS B nue BJ ER AA SFerdtac EO p Ovesen H D Ice E B esce Bing E Bn wCre D B nayan IR B Boit OR B riimit CR D Piroecrtw CA biSepacetice CR D Neel Figure 14 Extraction Definition 60 KYC Administration Guide Release 2 0 Extraction Appendix C Configurability OF GAA Infrastructure rus internet Expleror ORACLE Finnnonl Services Aralyiical Applications Infrastmacturm KE _ Database Extr
36. ase 2 0 11 User Review Chapter 2 KYC Architecture Overview The following figure illustrates a high level flow for the re review workflow OFS KYC Re Review Workflow o KYC Review Process Customer Risk Assessment Attributes Rule Based Algorithm Based Feedback to Risk Based Ranking User Review Banks Decision Auto Close Figure 10 Re Review Workflow User Review Risk assessments which are created by executing these workflows are categorized into Open Risk Assessments and Closed Risk Assessments once risk assessment process is complete Open risk assessments are promoted to cases in Oracle Financial Services Enterprise Case Management Users can review these cases from the Oracle Financial Services Enterprise Case Management UI Risk Assessments which are not promoted to case are auto closed and the information is retained in KYC system Once the KYC case review is complete Case Closure feedback is sent to the Account Opening System and the Oracle Financial Services Alert Management system Case Closure is triggered through one of the following types of investigations defined in KYC e System Investigation Auto Closure User Investigation Closed by the compliance user 12 KYC Administration Guide Release 2 0 Pre requisites Chapter 2 KYC Architecture Overview KYC assesses risk using the following processes e Real Time Account On Boarding Risk Risk assessment process at the tim
37. ask77 FN CCRCALC UPDWT TRANS Algorithm based risk assess Task77 RSKSCORE FORM DATA ment process Task78 FN CLOSUREUPD RA TRANS Algorithm based risk assess Task78 CERSCORE FORM DATA ment process Task79 FN CLOSUREUPD RA TRANS Algorithm based risk assess Task79 CERCTGRY FORM DATA ment process Task80 FN CLOSUREUPD RA TRANS Algorithm based risk assess Task80 CERPRIOR FORM DATA ment process Task81 FN CLOSUREUPD RA TRANS Algorithm based risk assess Task81 LASTDATE FORM DATA ment process Task82 FN CLOSURE UPDAT TRANS Closure updated for the risk Task82 ES FORM DATA assessments created Task83 LogModelBasedAction LOAD DATA Log action for Algorithm based Task83 risk assessment process Task84 FN RA TO CASE TRANS Promotion of the Risk assess Task84 FORM DATA ment to a Case KYC Administration Guide Release 2 0 45 Regular Processing Appendix A KYC Batches Table 8 Regular Processing Rule Name Task No As configured Description Component Id Precedence Task85 Auto_Case_Assignment TRANS Invoking the Auto Case Assign Task85 FORM DATA ment process of AML for assign ing the cases to the users Task86 FN POST CASE ASSI TRANS Updating the details of the cases Task86 GNMENT FORM DATA after the case assignment pro cess is complete Task87 FN CUST RA HISTOR TRANS Population of the data related to Task87 Y FORM DATA the Risk assessments created for the customer i
38. core is beyond the limit defined to cases in the ECM system fn ra purge This function will delete the data used for arriving at the risk score of all the closed risk assessments from various tables based on the parameters provided FN PRCNG TMP WITH IP DR This function will identify the Interested parties of the customers identified for risk assessment during the Regular processing batch FN PRCNG TMP WITH IP DI This function will identify the Interested parties of the customers identified for risk assessment during the Deployment initiation processing batch FN PRCNG ACT DATA LOAD This function will load the data from the RA processing tables to the actual RA tables after the risk assessment process is complete FN PARTITION MAINTENANCE This function will create and maintain the partition created on the FCT CUST RA HISTRY table FN LOG MSG This function is used to load the messages into the APPLN LOG MSGS table during the execution of the functions procedures packages FN INCPRCDATEBYONE This function will increment the KYC processing date by one day and keep the system ready for the next batch KYC Administration Guide Release 2 0 39 Chapter 4 KYC Architecture Overview Table 7 Functions Stored Procedures and Packages Function Stored Procedure Package Description fn_get_case_owner This function is used to identify the owner to whom the cas
39. d also be cleared on a regular basis List of Holidays The bank is expected to update the list of holidays to the master Holiday List table To update the holiday list follow these steps 1 In the LHS menu of OFSAAL select the KYC Infodom from the Connected to drop down 2 Navigate to Administration gt Security Management The OFSAA Infrastructure Administration page displays 3 In LHS menu of Administration navigate to System Administrator gt Holiday Maintenance The Holiday Maintenance page displays 4 Click on the Add icon The New Holiday pop up displays 5 In the New Holiday pop up click on the calender icon and select a date 6 Click Save The Holiday List updates and the selected date displays in the list To delete a holiday follow these steps 1 In the Holiday Maintenance page select a date from the Holiday List 20 KYC Administration Guide Release 2 0 KYC Specific Terminology Chapter 2 KYC Architecture Overview 2 Click the Delete icon A message Do you want to delete the holidays displays 3 Click OK A message Holidays deleted successfully displays 4 Click OK The updated Holiday List displays The holiday list should be same in both Behavior Detection Framework and KYC The list of holidays should contain the weekly holidays as well as the annual holidays Entries should be made well before the end of the calendar year since this list is used by the OFS KYC to arrive at the Next Re Review Dat
40. dix A KYC Batches Deployment Initiation Processing Table 9 Deployment Initiation Processing Task No Rule Name As configured Description Component Id Precedence Task1 FN DEL DATA FRM PRON Truncate the data from KYC process TRANSFORM G ing tables DATA Task2 CustldentificationDI Identify the customers for Risk LOAD DATA Task1 assessment creation for DI Task3 FN CUST IP PRCNG DI Identify the interested parties for the TRANSFORM Task2 risk assessed customers DATA Task4 CreateRA Creation of the risk assessments LOAD DATA Task3 Task5 RACreationAction Log action for risk assessment cre LOAD DATA Task4 ation Task6 InitAcctRvwDtls Account Repository maintenance LOAD DATA Task5 Task7 InitCustRvwDtls Customer Repository maintenance LOAD DATA Task6 Task8 CreateSnpCust Copy snapshot of risk assessed cus LOAD DATA Task4 Task5 tomer Task6 Task7 Task9 AccountOpenDoc Documents required for Account TRANSFORM Task8 Opening DATA Task10 CreateWlsReq Create request for watch list process LOAD DATA Task9 ing for all the risk assessments Task11 Watchlist FuzzyMatch Invoking the Oracle Financial Services TRANSFORM Task10 Behavior Detection Framework DATA fuzzy match utility to scan the cus tomers who are extracted above Task12 CreateWlsResult Populate the results for the watch LOAD DATA Task11 requests created Task13 LogWIsAction Log action for Watch
41. e KYC Purging Utility KYC data structures ate populated through the workflows such as Default Review Accelerated Review Re Review Processing Deployment Initiation Processing Feedback Processing and so on Over a period of time this data volume will grow and the application administrator should purge data from the production systems after the necessary archival process is completed This utility helps the application administrator purge the data from the Staging Risk Assessment and Log tables KYC Specific Terminology Customers For more information refer to the KYC Risk Assessment Guide Catch All Bucket In each of the Dimension tables an additional entry is specified whose key is maintained as 999 This entry is also referred to as the catch all bucket If the customer provides data for a corresponding risk score that is non existent in the Dimension tables then the risk score of the catch all bucket is used in the risk assessment process By default the risk score of the catch all bucket is maintained at the highest value to denote a high risk potential Auto Closure Auto Closure is based on the following criteria e The User Review Flag of the risk category to which the risk score belongs should be set to N The difference between the present risk score and previous risk score should be less than the value specified in the parameter KYC_CHG_IN_CUST_RSK_TOLERANCE The Auto Closure process consists of the following s
42. e in the Master Customer table matches the processing date A Risk Assessment is created for customers whose next review date matches with the current day s processing date This batch is executed once every day Feedback Application EOD Processing During the execution of the regular processing batches the risk scores at customer levels are sent to the Oracle Financial Services Alert Management system and the account opening system The feedback batch achieves this goal by consolidating customers and their risk scores on whom the risk assessment was created analyzed and closed for the processing date The application also creates a KYC watch list feed for the Oracle Financial Services Alert Management system for the customers whose review is completed In addition the second level application staging tables maintained are cleared as part of the application EOD processing Periodic Maintenance Clearing Staging Tables Log Tables and Log Files Staging tables are populated during the Real Time Account On boarding risk assessment process The data must be cleared periodically for better DB space management This facility is not pre configured and is done as an implementation activity based on the implementation specific requirements For information on where the logs are created refer toKYC Batch Execution Logs on page 67 Log tables can be cleared on a regular basis or as needed by the client The directory containing the log files shoul
43. e must assigned during the Promote to case activity FN_DEL_DATA_FRM_PRCNG This function will delete the data from the KYC processing table before the actual KYC batch processing is carried out FN_CUST_RA_HISTORY This function will load the data of all the risk assessments created on all the customers on that particular day into the FCT CUST RA HISTRY table FN CLOSUREUPD RALASTDATE This function will update the last risk assessment date for all the risk assessments during the algorithm based risk assessment process FN CLOSUREUPD RACERSCORE This function will update the CER score for all the risk assessments during the algorithm based risk assessment process FN CLOSUREUPD RACERPRIORITY This function will update the priority for all the risk assessments during the algorithm based risk assessment process based on the CER score of the risk assessment FN CLOSUREUPD RACERCTGRYSCORE This function will update the risk category based on the CER score for all the risk assessments during the algorithm based risk assessment process FN CLOSURE UPDATES This function does the Closure Updation for the risk assessments for all the workflows FN CCRCALC UPDWTRSKSCORE This function will update the Dynamic weighted risk score for all the risk assessments during the algorithm based risk assessment process FN CCRCALC UPDRSKSCORE This function will update the Dynamic risk score for all the risk a
44. e of account opening e Deployment Initiation Workflow Risk assessment process for existing customers One time start up activity based on Jurisdiction Customer Type and Length of Relationship e Default Review Risk assessment of the newly opened account s owner e Re Review Periodic Review Accelerated Review Risk assessment of the customer This process is based on Oracle Financial Services Behavior Detection Framework Alerts Change in information e User Review Risk assessment process for both Existing and New customers based on the case Risk Category Pre requisites The following pre requisite activities must be completed before the OFS KYC configuration and maintenance begins e Installation of the OFSAAL using the OFSAAI Installer and OFSAAI Installation Manual e OFSAAI Servers Start up e OFSKYC Pre Installation Activities e Completion of OFS KYC Installation e OFS KYC Post Installation Activities Operations Oracle Financial Services KYC operations are classified into the following types Initial One time Activities Daily Activities Periodic Maintenance Activities Initial One time Activities Managing Users Excel Upload Process Configuring Application Parameters Configuring Application Installation Parameters Configuring Rule Based Risk parameters KYC Administration Guide Release 2 0 13 Initial One time Activities Chapter 2 KYC Architecture Overview e Configuring Algorithm Based Risk paramete
45. e tete min ne bre n dnd ipe ie ea ERES 24 Accelerated Re Review Reasons 323 duis od 25 Customer Idetitificatiofi ssc ege ctc er teste EE em emet een t ie hus 25 Risk Assessment Cr ona ata tb a a e ette nde er i ta dee 25 KYC Master Customer and Master Account Table Maintenance eese nennen 26 Copy Map dui nie eiat anda a acta 26 Registration Information Flag and Request for Latest Ioformaton 26 Watch bist EE 26 Document Verification 3 iet eee ete i ette ette ee teretes deett 27 ID Verification nto aa ocioteca lila iii 27 Negative News Sears ta 27 Risk Ass ssment Initiation a i rever ee oe ter tre certe 23 Rale based E 28 zaisortbon based Rise ASOS EEN EES EE 28 Clostire Updates uere RU oe ERE OE LEA Meith tend end et DU Bie ail e ep es 28 Promoteto Gri REIR 29 Deployment Initiation Processing tiii eene iere eed rii bi iba prete dran 29 Risk Assessrientzscssa e Tae dea mtenodiadenadaiuimiatiemamqua agent eeeemteoa mamada 29 Risk Models lia lion iniciada 30 Catch AAll Bucket in Dimension Va att eed cis 30 Dynamic ATTI RE 30 Foot Day Processing ee 20 vi KYC Administration Guide Release 2 0 Contents Feedback to the Oracle Financial Services Behavior Detection Framework Account Opening System 30 CBSE LP ate 31 Watch Last Entry Feedback V M 32 Customer Risk Assessment Details 32 Customer Risk Assessment Fis tory aer
46. ed cus tomer Task47 CpySnpCustMkt LOAD DATA Copy snapshot of the market Task47 served by the customer for the risk assessed customer Task48 CpySnpCustPrd LOAD DATA Copy snapshot of the products Task48 provided by the customer for the risk assessed customer Task49 LogSnapshotAction LOAD DATA Log action for snap shot Task49 Task50 FN RB PROCESSING TRANS Rule based risk assessment pro Task50 FORM DATA cess Task51 CCRCalc_CIP_Dtls LOAD DATA Algorithm based risk assess Task51 ment process Task52 CCRCalc_CIP_PC LOAD DATA Algorithm based risk assess Task52 ment process Task53 CCRCalc_CIP_IP LOAD DATA Algorithm based risk assess Task53 ment process Task54 CCRCalc WLS Dis LOAD DATA Algorithm based risk assess Task54 ment process Task55 CCRCalc WLS PC LOAD DATA Algorithm based risk assess Task55 ment process Task56 CCRCalc WLS IP LOAD DATA Algorithm based risk assess Task56 ment process Task57 CCRCalc NNS Dis LOAD DATA Algorithm based risk assess Task57 ment process Task58 CCRCalc NNS PC LOAD DATA Algorithm based risk assess Task58 ment process Task59 CCRCalc NNS IP LOAD DATA Algorithm based risk assess Task59 ment process Task60 CCRCalc RelshpRsns LOAD DATA Algorithm based risk assess Task60 ment process Task61 CCRCalc CorpAgeRsns LOAD DATA Algorithm based risk assess Task61 ment process Task62 CCRCalc CntyOprRsns LOAD DATA Algorithm based risk assess Task62 ment process 44 KYC Administration Guide Release 2 0
47. ed segment name Information Domains o EB KYCINFO OPEN Cancel Delete Figure 18 File Name 64 KYC Administration Guide Release 2 0 Resaving Runs Appendix C Configurability 8 Select the Deployment Initiation Processing Run List for KYCINFO KYCSEG List Unauthorized APPROVE Ul UU SUD ered e ent Initiation Processing IDV Request Ul NNS Request Ul Regular Processing Risk Propagation Risk Rating Ul WLS Request Ul Weekly Processing Name Deployment Initiation Processing OPEN Cancel Delete Figure 19 Deployment Initiation Processing Run 9 Once the Run opens click Save A pop up window displays 10 Select the Immediate batch Creation Mode checkbox and the Create batch with run rule tasks radio button and click Save 11 Click OK to close the confirmation message 2382 Run Saved Successfully Figure 20 Confirmation Message 12 Close the Rules Framework screen 13 From the Operations menu click Batch Execution and verify the resaved batches are visible in the Batch Execution screens KYC Administration Guide Release 2 0 65 Resaving Runs Appendix C Configurability If the batches are not visible navigate to the Administration gt Utilities gt UserGroup Batch Execution Map screen and execute the following steps OF SAA tft ewtructure Windows Internet Explorer ORACLE Financial Services Analytical Applications In
48. ee dee ri en i o e dase PE redeo 33 Incrementing the Processing Date ette nai aa 33 Renaming and Transferring Feedback files sse eene nennen 33 Utility for Periodic Review Customer distribution sse eene 33 Utility tor ihe ederet em teret tet tiae tern ten e t e PR E ER AP crede dena 34 e 34 CHAPTER 3 VIO WS sro vobia aen ba cdit fa e Le voa node dc oh bes 37 CHAPTER 4 Functions Stored Procedures and Packages 39 APPENDIX A KYO El 41 Regular Processing iuit t tete enne n up en dencia 41 IR ee EE 47 od et Day Reese ees geed 50 APPENDIX B Excel Upload Templates 1 ccccccccccccssscssssssennnnnnneeeeneeeensssssnsssnsees 51 Excel Upload Templates i 2 edente nie deme direi ios dd a te o edad 51 APPENDIX C Config rability ai 53 Application Related ConfipuratiOn aaa 53 OFSAAT Related Configuration gae tete pne tenen a eoe pid refe diete lice iia 53 Application Configuration using OFSAAI Configurability seen eene nennen 57 APPENDIX D Extraction Definition 42 Lese eere e esses en nna nn nnn u unn a ann nu uuu 59 Ee eier EE 59 APPENDIX E Resaving RUNS EE EE Ee 63 R sayi g RUS PPP MM 63 APPENDIX F KYC Batch Execution Logs cc creee eere 67 Table 2 Table AD some ett tectis cde tei EE 67 Pile OH RE 68 Transform Data Data transformatio
49. ent The Customer Account Details will be referred from the Business schema and Alert details will be referred from the Alert Management schema Re review rules are part of Regular Batch Customer Identification For every customer who has an account in the bank a risk assessment is created KYC solution identifies the customers who need to be processed for the creation of the Risk assessment as per the below conditions e Customer should be an active customer e Customer should have at least one account mapped to him The account mapped to the customer should be an active account e Customer should be having a controlling role on the account mapped to him Interested parties are calculated for the customers who are identified for the Risk assessment creation and are stored in the KYC system Risk Assessment Creation Risk Assessments are generated for the primary account holder s joint account holders and guardians of the accounts for whom a positive acknowledgement has been generated Each Risk Assessment is identified by the Risk Assessment reference associated with it Risk Assessment reference is generated by appending the customer ID to the word CASE and then appending the processing date In YYYYMMDD format to the result This ensures that each risk assessment is unique Only one Risk Assessment is generated on a customer per day If the parameter RA Periodicity is configured as one in Vw Appln Params table Risk Assessment Per
50. es of their relationship with the bank The different stages of the relationship are desctibed in the following sections e Deployment Initiation e Real Time Account on Boarding e Account on Boarding Default Review e Re review KYC Administration Guide Release 2 0 Application Overview Chapter 2 KYC Architecture Overview OFS Know Your Customer Application Overview Reference Data Callable Processing Investigation P Reporting Framework Service FW Framework d Framework FW Reference Data CaseCategorization Deployment Initiation OFS BDF Existing Customer and Account Info Workflow Management Reporting OFSBDF Alerts Templates ID Verification Bib Real time i Risk Rating Default Review Investigation Re Review Risk Assessment Common Risk Management Product Transaction Rating Rules El L e Reporting OFS BDF Closure Templates Processing Workflow Watch List Risk News Search Info Ux E S p o o o o o Geographies Thresholds Rule Attributes End of Day Processing OFSAAI Unified Metadata Centralized Business Definitions Metrics Reports Workflows Figure 6 Know Your Customer Overview The Oracle KYC risk assessment application is built using the OFSAAI framework The application functions are divided into the following areas e Reference Data Management Internal and External e On line interface with account opening system e Ri
51. f Relationship Oracle Financial Services client can also process the data based on length of relationship of the customer and this is configurable Note All the above criteria for processing can be done separately or by combining them Refer to the KYC DEPLOYMNT INIT WF parameter under the application parameter Risk Assessment For KYC Risk calculation the following are required e Risk Assessment Models Risk Assessment Model Parameters and their appropriate weights e For Every Risk Parameter Possible Values and their Risk Score KYC Administration Guide Release 2 0 29 End of Day Processing Chapter 2 KYC Architecture Overview e Customer Attributes for each of these risk parameters This module represents the computational engine of the OFS KYC Risk Models KYC risk models are of the below types e RAOR e Rule Based e Algorithm Based For mote details refer to the KYC Risk Assessment Guide Catch All Bucket in Dimension Tables If the data provided in the fact tables does not match with any of the values in the dimension table then the score associated with the default value specified in the dimension table is utilized This default entry is identified by the name Others or the key 999 Dynamic Weight Calculation The overall weight of all the parameters is always equal to 100 During the Risk score calculation the data provided for the customer is compared with the static data in the mapping jurisdiction tables
52. frastructure Connected to KYCAFO a UserGroup Batch Execution Map nome CH Unified Metadata Manager gt Y Rules Framework eh Forms Framework e Operators B System Configuration amp Administration Security Management Metadata Authorization Save Uetadata h Utines Enable User Transfer Ownership Write Protected Batch UserGroup B3tch Execution Mao User Atitute Upload Locale Desc Upload Metadata Diferente E shy information Delivery wd Advanced AMES infrastructure KYC Figure 21 Batch Execution Map Screen a Select the KYC Infodom from the drop down b Select the KYC Admin Group c Select the runs d Click Save The resaved batches should be visible in the Batch Execution screen 66 KYC Administration Guide Release 2 0 APPENDIX F KYC Batch Execution Logs This section provides the information on where log files are created for each type of task in the Oracle Financial Services KYC Logs are created only after the batches are executed The following types of tasks are present in the batches Table 2 Table 12T File 2 Table F2T Transform Data DT m SQL Function execution m Shell Script execution Table 2 File T2F Run Rule PR2 Rule Batch Execution Logs are based on the types of rule The following sections describe the types of task present in the batches Table 2 Table T2T The logs for this type of task will be created in the path as follows lt Ofsaai Installed Area gt
53. g figure illustrates the OFSAAI components when deployed on a single computer or when distributed across multiple computers Proposed configuration option in Production environment Two physical machines RAC env for OFSA amp A Infodorn database Hatlze Tier Toolkit contig schema Machine B Oracle Atomic schema DB environment Machine C Figure 4 OFSAAI Components Deployment Option A Proposed configuration option 2 in production environment Al OFSAA Components amp Workflow Engine Machine A E Oracle Config schema n am Oracle Atomic schema iG 5 e m zy E i 3 o du Database Environment Machine B Figure 5 OFSAAI Components Deployment Option B KYC Administration Guide Release 2 0 5 Deployment View Chapter 1 KYC Architecture Overview 6 KYC Administration Guide Release 2 0 CHAPTER 2 KYC Operations This chapter discusses the following topics e Application Overview e KYC Modules e User Review Pre requisites Operations e Initial One time Activities e Daily Activities e Periodic Maintenance e KYC Specific Terminology e Real Time Account On Boarding Review e Regular Processing e Risk Models End of Day Processing Application Overview Know Your Customer assesses the risk a customer poses to the bank or financial institution It is not a one time assessment but is a continuous process of assessing customers Customers are assessed in different stag
54. he Account Opening System are available after KYC End of Day EOD processing is complete These files must then be scheduled for loading into Oracle Financial Services Behavior Detection Framework and the Account Opening System The processing date will be the date of KYC EOD Processing 30 KYC Administration Guide Release 2 0 End of Day Processing Chapter 2 KYC Architecture Overview e CBS Feedback incremental dump of processing day for Oracle Financial Services Alert Management system e Watch List Entry Feedback full dump as of processing day Customer Risk Assessment Details Incremental dump as of processing day for the Account Opening System The delimiter for the extract file can be defined under Unified Metadata Data Integrator Refer to the Appendix D Extraction Definition on page 59 CBS Feedback This file contains the Customer ID and the risk score computed by the risk assessment engine The file name is obtained by appending the processing date to GenCustDetails ED The Feedback Flag will update in the FCT CUST RVWDTLS table KYC will not send Customer Feedback unless the Business schema is present This file will be sent in the batch which runs in the subsequent days Table 3 CBS Feedback SL No Business Name Data Type 1 Risk Assessment ID String 2 Customer ID String 3 Customer Name String 4 Customer Effective Risk Score Number 5 Risk Assessment Closed Date Date 6 Next Re review Da
55. i D uS Tool d kk a all Ld 4 k Data Transformation RDB Non RDB Flat Files Business Rules gm Data Model gt Dataloading ki T Services NSU STU a VSAM Files a Delimited Frack Data oce l F V Quality Rules ce noong D SAMFIIes bjFued ne v Transformation Source Data X Source Data Definition Model Mapping Figure 11 Data Integrator Process Flow 54 KYC Administration Guide Release 2 0 OFSAAI Related Configuration Appendix C Configurability The following figure illustrates basic metadata derived entity rules and reports Mart Builder Process Flow Data Model Multi Dimensional Data Mart Relational Relational Data E Marketing Database Mart Relational Data Finance Mart Figure 12 Mart Builder Process Flow KYC Administration Guide Release 2 0 55 OFSAAI Related Configuration Appendix C Configurability Elements of OFSAAI Configurability Includes the Metadata driven Forms framework and Universal Mapper o Business Data Model OFSAAI mm Configured Using Tool Specific Editors Data Model Metadata D efinitions ut LE E Hierarchies Datasets Measures e H t GE P Hierarchy Business Attributes Maps Processors Definition Framework for Business Administrators Users EX al ci ma Operations Rule amp Run Reportin Model poh i Definitions agian Definitions Seourity amp Admin Figure 13 Elements of O
56. ils DATA Task3 GenCBSFeedback_ED Extract customer details for CBS EXTRACT Task2 DATA Task4 FN_INCPRCDATEBYONE Incrementing the KYC processing TRANSFORM Task3 date by 1 day DATA Task5 KYC File Rename Renaming of the extracted files TRANSFORM Task4 according to the AML needs DATA Task6 FN RA PURGE Purging of the Autoclosed or UI TRANSFORM Task5 closed risk assessments DATA Task7 FN_PARTITION_MAINTENANCE Droping the partition on the TRANSFORM Task6 FCT_CUST_RA_HISTRY table DATA Task8 FN_REREVIEW_DATE_DI Spliting of the customers pro TRANSFORM Task7 cessed through the DI processing DATA back for periodic re review 50 KYC Administration Guide Release 2 0 APPENDIX B This chapter discusses the following topics e Excel Upload Templates Excel Upload Templates Excel Upload Templates The Excel Upload activity must be done in a specific order for certain templates The order of the excel upload is as below Table 11 List of Excel Upload Templates Table Name Excel Upload Template Excel Mapping Name DIM_JURISDICTION DIM JURISDICTION xls DIM JURISDICTION xml DIM CUSTOMER TYPE DIM CUST TYP xls DIM CUSTOMER TYPE xml DIM COUNTRY DIM COUNTRY xls DIM COUNTRY KYC xml APPLN INSTALL PARAMS APPLN INSTALL PARAMS xls APPLN INSTALL PARAMS xml APPLN PARAMS APPLN PARAMS xls APPLN PARAMS xml APPLN RB PROCESSING APPLN RB PROCESSINGxIs A
57. iodicity is another parameter considered while generating Risk Assessments The value associated with this parameter defines the minimum duration between two Risk Assessments on the same customet KYC Administration Guide Release 2 0 25 Regular Processing Chapter 2 KYC Architecture Overview Risk Assessment Periodicity can be fine tuned further using the configurable parameter depending on the implementation needs Refer to the parameter KYC_CASE_PERIODICITY_IN_DAYS in Application Configuration using OPSAAI Configurability on page 57 for more information KYC Master Customer and Master Account Table Maintenance When a new account is opened or a new customer joins the bank in case of positive acknowledgement a record is made in the respective KYC Master Customer and Account tables The tables contain information related to previous and present risk calculation of the customer account Copy Snapshot After Risk Assessment creation the KYC solution copies customer and account data as on Risk Assessment creation date into a new set of tables with each record tagged to the Risk assessment to which it belongs The data is fetched from the business schema ECM Registration Information Flag and Request for Latest Information If the time period between the processing date and the last updated date of the customer s information is greater than the value specified in the application parameter Minimum Verification Time Period KYC_MIN_VE
58. l file this file is provided by the Installer data ftpshare STAGE ACCOUNT OPEN 20121121 ExtAcct DR dat This is the file provide by the client bad ftpshare STAGE ACCOUNT OPEN 20121121 ExtAcct DR bad This file will be created only if any of the data is rejected from the actual dat file e log ftpshare ACCOUNT OPEN 20121121 F2T TEST dat Log This log file provides the information on how many records are loaded and how many are rejected also the reason why the data is not loaded Transform Data Data transformation or DT logs The logs for this type of task will be created in the path as follows The following types of definitions can be defined under data transformations e Executing a Stored procedure e Executing a Shell script The following log files are created for the Stored Procedure execution type of Transform data The definition name will be available in these log files lt Ofsaai Installed Area ficdb log date DT KYC12DOM 1221824179931 20121123 1 Task23 log lt Ofsaai Installed Area ficdb log date RunProc KYC12DOM 1221824179931 20121123 1 Task23 1og ftpshare DT Definition name log 68 KYC Administration Guide Release 2 0 Table 2 File Extraction of Data Appendix A KYC Batches The following logs are created for the Shell script type of Transform data Ofsaai Installed Area ficdb log date DT KYC12DOM 1221824179931 20121123 1 Task23 log Informa
59. lgorithm based risk assessment pro LOAD DATA Task39 cess Task41 CCRCalc PubCompRsns Algorithm based risk assessment pro LOAD DATA Task40 cess 48 KYC Administration Guide Release 2 0 Deployment Initiation Processing Appendix A KYC Batches Table 9 Deployment Initiation Processing Task No Rule Name As configured Description Component Id Precedence Task42 CCRCalc_SrcWlthRsns Algorithm based risk assessment pro LOAD DATA Task41 cess Task43 CCRCalc LegStrcRsns Algorithm based risk assessment pro LOAD DATA Task42 cess Task44 CCRCalc MrktRsns Algorithm based risk assessment pro LOAD DATA Task43 cess Task45 CCRCalc ProdRsns Algorithm based risk assessment pro LOAD DATA Task44 cess Task46 CCRCalc CustCCRSmry Algorithm based risk assessment pro LOAD DATA Task45 cess Task47 FN CCRCALC UPDDYNWT Algorithm based risk assessment pro TRANSFORM Task46 cess DATA Task48 FN CCRCALC UPDRSKSC Algorithm based risk assessment pro TRANSFORM Task47 ORE cess DATA Task49 FN CCRCALC UPDWTRSK Algorithm based risk assessment pro TRANSFORM Task48 SCORE cess DATA Task50 FN CLOSUREUPD RACER Algorithm based risk assessment pro TRANSFORM Task49 SCORE cess DATA Task51 FN CLOSUREUPD RACER Algorithm based risk assessment pro TRANSFORM Task50 CTGRY cess DATA Task52 FN CLOSUREUPD RACER Algorithm based risk assessment pro TR
60. lication Re Review Parameters Table Appln ReReview Params All these 13 rules should be updated for each jurisdiction in the Na Appln_ReReview_Params table Each record contains a rule number with which it is associated in the Re Review Processing Batch Each rule can be enabled or disabled depending on the site specific requirement This table specifies details such as Look Back Period Count of Alerts and Alert Score for the Rule For more information refer to the Configuration Guide Configuring Algorithm Based Risk Parameters Default weights for each parameter of the Model Based Risk Assessment Parameters are populated into the Appln Risk Rating Params table in the DB during Excel upload It is mandatory that one set of parameters is present in the Vw Appln Risk Rating Params table for the Jurisdiction DEFAULT which is pre packaged and installed as part of application installation The Appin Risk Rating Params has 62 entries by default The Risk Model Code and Risk Parameter Code columns indicate the model and purpose of each parameter The Appln Risk Rating Params table maintains the weight for each of the Risk Models Risk Parameters Multiple entries can be made for each parameter one for each jurisdiction to support multiple jurisdictions in a single installation Jurisdiction specific parameters are available in the Vw Appln Risk Rating Params table It is mandatory that all parameters are populated in the Vw Appln Risk Rating Pa
61. list scanning LOAD DATA Task12 Task14 CpySnpAdr Copy snapshot of the customer LOAD DATA Task13 address for the risk assessed cus tomer Task15 CpySnpCustPhnMnts Copy snapshot of the customer phone LOAD DATA Task14 for the risk assessed customer Task16 CpySnpCustCtz Copy snapshot of the customer citi LOAD DATA Task15 zenship for the risk assessed cus tomer Task17 CpySnpAcctMnts Copy snapshot of the customer LOAD DATA Task16 accounts for the risk assessed cus tomer Task18 CpySnpCustSrcWith Copy snapshot of the customer LOAD DATA Task17 source of wealth for the risk assessed customer Task19 CpySnpAcctRoleMnts Copy snapshot of the Role of cus LOAD DATA Task18 tomer on account for the risk assessed customer KYC Administration Guide Release 2 0 47 Deployment Initiation Processing Appendix A KYC Batches Table 9 Deployment Initiation Processing Task No Rule Name As configured Description Component Id Precedence Task20 CpySnpCustRelMnts Copy snapshot of the customer to LOAD DATA Task19 customer relationship for the risk assessed customer Task21 CpySnpCustCntyMnts Copy snapshot of the customer coun LOAD DATA Task20 try for the risk assessed customer Task22 CpySnpCustMkt Copy snapshot of the market served LOAD DATA Task21 by the customer for the risk assessed customer Task23 CpySnpCustPrd Copy snapshot of the products pro
62. n or DT og 68 Table 2 Pile Extraction of Data etii on eet e t ee ettet ete et tetur 69 Ruri Rule PR2 r le Update Rulo nuit a redde enemies tnm Ae 70 VAA RE EP 70 KYC Administration Guide Release 2 0 vii Contents viii KYC Administration Guide Release 2 0 List of Figures Pigure 1 OBSAAT Architecture enacted vete nii de eire re era e ced idas 2 Figure 2 OESAA L Solution Afchitectute c tentiae iaa 3 Figure 3 Communication Links and Protocols essent nentes 4 Figure 4 OPSAAI Components Deployment Option A 5 Figure 5 OPSAAI Components Deployment Option BE 5 Figure 6 Know Your Customer Over view s ic eere tette de reete e ed t d a erii dd des 8 Figure 7 Review Process Real Time Account On boatding sss 9 Figure 8 Review Process New Existing Accounts aa aia 10 Figure Regular Process iii M pias 11 Figure 10 Re Review Workflow seess EES 12 Figure 11 Data Integrator toeerst ree eere perge e oer de defe dr reg ee rerit t 54 Figure 12 Mart Builder Process Flow eoe ert OR Ree eee uteris 55 Figure 13 Elements of OFSAAI Configurability sese nene nennen 56 Figure 14 Extraction Definition iei metres diti iiit rite ebrii tin dee TE UR eH roodo dens 60 Fig re 15 Extract Properties seen eee heit uei i eie tenia na HER derive teri eere t te entes 61 PieurezT6 RTE been Fan odere Di e ett EH rede acute Cadac Eeer 63 Figure
63. nto the History table Task88 FN_PRCNG_ACT_DATA TRANS Movement of the data from the Task24 Task25 Task26 _LOAD FORM DATA Processing table to the Actual Task27 Task28 Task29 tables after the Risk assessment Task30 Task31 Task32 process Task33 Task34 Task35 Task36 Task37 Task38 Task39 Task40 Task41 Task42 Task43 Task44 Task45 Task46 Task47 Task48 Task49 Task50 Task51 Task52 Task53 Task54 Task55 Task56 Task57 Task58 Task59 Task60 Task61 Task62 Task63 Task64 Task65 Task66 Task67 Task68 Task69 Task70 Task71 Task72 Task73 Task74 Task75 Task76 Task77 Task78 Task79 Task80 Task81 Task82 Task83 Task84 Task85 Task86 Task87 Task88 Task89 GenCustDetails ED EXTRACT Extract the Customer feedback Task89 DATA details Task90 GenWLSFeedback ED EXTRACT Extract the Watchlist scanning Task90 DATA feedback details Task91 GenCBSFeedback ED EXTRACT Extract customer details for CBS Task91 DATA Task92 FN INCPRCDATEBYON TRANS Incrementing the KYC processing Task92 E FORM DATA date by 1 day Task93 KYC File Rename TRANS Renaming of the extracted files Task93 FORM DATA according to the AML needs Task94 FN RA PURGE TRANS Purging of the Autoclosed or UI Task94 FORM DATA closed risk assessments Task95 FN PARTITION MAINT TRANS Dropping the partition on the N ENANCE FORM DATA FCT CUST RA HISTRY table 46 KYC Administration Guide Release 2 0 Deployment Initiation Processing Appen
64. nts the result of document verification is negative Thus to determine the identity of the customer an external ID Verification is triggered External Identity verification is triggered only when the internal system based document verification process is unsuccessful and there is no prior external identity verification done Identity verification when initiated is done for the customer and customer s interested parties By default the KYC solution is configured to available services of eFunds IDV search to confirm the customer s identity The solution can be modified to interact with other service providers to carry out ID verification ID Verification can be switched on off in the KYC solution by altering the values of the parameter KYC IDV DEFAULT SCORE This parameter also provides the default score for those customers for whom no IDV score was obtained Negative News Search For all the risk assessments that have been created on the same day and are still in initiated status the negative news search is initiated against the risk assessed customer and interested parties Currently the KYC solution has been configured to interact with Factiva a Negative News Search service provider At the time of implementation the Negative News Search service provider can be changed to any other entity The application parameter KYC TP NN SCN is used during Negative News Search This parameter contains all the details necessary to access the Factiv
65. oc TRANS Documents required for Account Task26 FORM DATA Opening 42 KYC Administration Guide Release 2 0 Regular Processing Appendix A KYC Batches Table 8 Regular Processing accounts for the risk assessed customer Rule Name Task No As configured Description Component Id Precedence Task27 CreateWlsReq LOAD DATA Create request for watch list pro Task27 cessing for all the risk assess ments Task28 Watchlist_FuzzyMatch TRANS Invoking the AML fuzzy match Task28 FORM DATA utility to scan the customers who are extracted above Task29 CreateWlsResult LOAD DATA Populate the results for the watch Task29 requests created Task30 LogWIsAction LOAD DATA Log action for Watchlist scanning Task30 Task31 CreateNnsReq LOAD DATA Create request for Negative Task31 News Search processing for all the risk assessments Task32 NNS Invoke TRANS Invoke the external third party Task32 FORM DATA service for all the requests cre ated and load the data in the results table Task33 LogNnsAction LOAD DATA Log action for Negative News Task33 Search scanning Task34 CpySnpAdr LOAD DATA Copy snapshot of the customer Task34 address for the risk assessed customer Task35 CpySnpCustPhnMnts LOAD DATA Copy snapshot of the customer Task35 phone for the risk assessed cus tomer Task36 DocumentVerification LOAD DATA Identify verification is done for all Task36 the risk assessed customers
66. on The Accelerated Review Processing is executed along with Default Account Opening review after the Oracle Financial Services Behavior Detection Framework alert generation is complete Accelerated Re Review has eight rules Each of these rules checks for deviation from the standard for the customer A case is initiated against the concerned customers if obtained values exceed the specified thresholds The threshold values ate stored in the Appln_ReReview_Params table under the following columns e Look back period e Count of Alerts e Alert Score e Count of Changes If the threshold is breached a reason will be created in the Re Review Case Reasons table por Rereview Ra Reasons for the creation of a risk assessment Regular Processing Re Review Periodic After every review Account Opening Review Deployment Initiation Accelerated Review the next review date is set for the customer based on the risk assessed Thus customers are periodically subjected to Risk Assessment which is essential as the risk associated with each customer may change over time KYC Administration Guide Release 2 0 19 Periodic Maintenance Chapter 2 KYC Architecture Overview After a case is closed the customer s next review date is determined by adding the time period specified for the current risk category of the case to the processing date in line with the holiday list definition Re Review Processing checks whether the Next Re Review Dat
67. or Watch List Scanning Currently the solution has been configured to interact with the Oracle Financial Services Behavior Detection Framework Watch List The third party service can also be modified to allow the solution to interact with any other Watch List as well The application parameter Third Party Watch List Scan KYC TP WL SCN is a part of the Watch List rule This allows the customer to disable the rule if scanning is not desired 26 KYC Administration Guide Release 2 0 Regular Processing Chapter 2 KYC Architecture Overview Document Verification After Risk assessment generation the documents supplied by the risk assessed customer are verified to confirm the customer s identity A list of documents is provided in Document Guidelines Table Fct Docs Guidelines along with the level to which they belong A customer s identity is considered confirmed only if the required number of documents of desired level is provided The number and level of the document can be configured by modifying the content of the parameter KYC DOC VERF REQD in the Vw Appn Params table ID Verification The customer type provided by the external Account opening system should match with the customer type provided in the KYC solution If there is a mismatch in the customer type then risk assessment will not be created on the particular customer and hence risk assessment will not take place for that customer If the customer has not provided sufficient docume
68. ould be configured in the appln install params The Oracle Financial Services KYC system is also responsible for sharing Account Customer and Watch List feedback to the Oracle Financial Services Alert Management system and Oracle Flexcube system at the disposition of the KYC review The extract names ate not compatible with the Oracle Financial Services Behavior Detection Framework file naming convention This utility will complete the following activities based on the configurations set for the implementation 1 Moves the files to the different location in the same server 2 Renames the files with the extension defined 3 Maintain a copy of the extract in the history directory with its original name 4 The utility covers the following extracts in KYC 2 0 e GenCustDetails ED lt YYYYMMDD gt e GenWLSFeedback ED lt YYYYMMDD gt Utility for Periodic Review Customer distribution This utility distributes fixed number of customers into different Next Re Review Dates so that huge number of Cases are not processed in Periodic Re Review in a single day This task is tagged in the EOD batch and to be executed after successful execution of deployment initiation batch The following parameters must be set for execution of the utility through the batch execution screen e Number of Customers per day e Number of days from when the customers need to be distributed These parameters must be set before running this utility KYC Administration
69. oyee of a specific Oracle Financial Services customer The System Administrator maintains user accounts and roles monitors data ingestion and case management archives data loads data feeds and performs post processing tasks How this Guide is Organized The Oracle Financial Services KYC Administration Guide includes the following chapters Chapter 1 KYC Architecture Overview provides a brief overview of the Oracle Financial Services KYC architecture and operations Chapter 2 KYC Operations details the Application Operations of the KYC Chapter 3 Vzews details the Oracle database view definitions to process risk assessment requests Chapter 4 Functions Stored Procedures and Packages details the functions and stored procedure definitions to process risk assessment requests Appendix A KYC Batches covers the KYC Batch and the tasks within the batches Appendix B Exve Upload Templates describes the templates used by the Excel Upload feature Appendix C Configurability describes how to configure the Oracle Financial Services KYC Appendix D Extraction Definition describes the delimiters used to extract KYC Administration Guide Release 2 0 About this Guide e Appendix E Resaving Runs describes how to save and resave runs e Appendix E KYC Batch Execution Logs provides the information of where log files are created for each type of task in the Oracle Financial Services KYC Where to Find More Information
70. process the risk assessment request received The following table describes these functions and procedures Table 7 Functions Stored Procedures and Packages Function Stored Procedure Package Description Fn_Working_Days This function ensures that the selected next Re Review date is a working date If the calculated Re Review date is a holiday the customer will not be eligible for Periodic Re Review processing The next Re Review date must be computed at the time of Auto Closure FN_REREVIEW_DATE This function is used to identify the periodic review date for Deployment Initiation customers by splitting the customer base into equal slices per day starting from the number of days defined in the attribute FN REGISTRATION CHECK DRR This function checks for all the risk assessments where the difference between the processing date and the date when the risk assessed customer s records were last updated If this date is greater than the threshold value specified in the Registration Task Minimum Period application parameter KYC CASE REG TASK MIN PRD then the Registration Information Update Required Flag is set to Y and the RA status is set to HOLD FN RB PROCESSING This function ensures that all the risk assessments eligible for Rule Base Processing are processed through the Rule based processing engine FN RA TO CASE This function will promote all the risk assessments from the KYC system when the CER s
71. r is built on the OFSAAI Platform You can think of architecture as a blueprint of parts that fit together to define a system For example structure interface and communication mechanisms function as architecture Functional views can also describe the architecture The following views illustrate the implementation details of the Oracle KYC architecture e OFSAAI View Illustrates system components and their dependencies e Deployment View Illustrates the deployment of components to processing nodes KYC Administration Guide Release 2 0 1 OFSAAI Architecture Chapter 1 KYC Architecture Overview OFSAAI Architecture The following figure illustrates the subsystems composing the OFSAAI architecture These subsystems are used for application development and maintenance Figure 1 OFSAAI Architecture The OFSAAI provides the framework for building applications such as KYC The deployment of multiple solutions and applications can occur on a single OFSAAT installation Each adds domain specific content to provide the required services for addressing a specific business problem The OFSAAI includes reusable metadata artifacts and data structures It also provides the required presentation packages and custom application objects for supporting the user interface functionality 2 KYC Administration Guide Release 2 0 OFSAAI Architecture Chapter 1 KYC Architecture Overview OFSAAI Solution Architecture Risk amp Compliance
72. rams table for each jurisdiction specified in the Dim Jurisdiction table The pre configured values can be fine tuned to suit the site specific requirements in the Excel data files before the Excel upload or moditying the parameter values after the Excel upload process by the KYC Administrator For more information refer to the Configuration Guide Defining Score for Values in KYC Risk Assessment Risk values related to risk parameters are maintained in individual dimension tables Data is populated into the dimension tables through the Excel upload to ensure successful execution of KYC batches The data and risk scores must be fine tuned to suit implementation specific needs Risk scores related to the static data in the respective dimension tables are used in risk score calculation The Excel templates contain pre configured risk parameter values and associated risk scores These risk parameters can be 16 KYC Administration Guide Release 2 0 Initial One time Activities Chapter 2 KYC Architecture Overview fine tuned in the Excel data files before the data is uploaded or the value can be changed by the KYC Administrator For more information refer to the Configuration Guide Refer to Excel Upload Templates on page 51 for more information about the upload sequence These Excel templates are available in the following area ftpshare STAGE Excelupload KYCLookupTables in the ficapp layer Setting up Document Guidelines The
73. re provided to the system through the KYC Configuration Rule Based Assessment Model User Interface by the Admin user For more information about providing values for rule based assessment refer to the Configuration Guide The bank or the FI can provide as many values as required for a tule A customer can fall under one or more rules during rule based assessment When a customer has been matched to multiple rules the system considers the maximum score of the matched rules For example a customer has matched the Country of Citizenship and Country of Residence rules with the values being Afghanistan and India with a score of 45 and 60 respectively In this case the system considers the CER as 60 for the customer It also captures and display all the rules matched All risk assessments created using this work flow will be automatically promoted to a case irrespective of the CER score This overrides the ranges defined in the Risk Category table User Review flag as Y Algorithm based Risk Assessment Customers who are not assessed using the Rule based Assessment Model are assessed using Algorithm based Assessment Model Algorithm based Assessment Model calculates the risk of customers based on different parameters which are based on customer type For each parameter the system checks the value provided by the customer who is being risk assessed and retrieves the score of that value from the respective static Jurisdiction table If the value pro
74. rs e Defining Re Review Risk Thresholds e Defining of Parameters used in the KYC risk assessment e Setting up Document Guidelines e E Funds Factiva Specific Pre requisites e Setting up KYC Real Time Service Request e Scheduling of KYC batches e Listing Holidays in the OFSAAI Administration User Interface e Deploying Initiation processing based on the implementation need Daily Activities e Real Time Account On Boarding Risk Assessment e Regular Processing Default Review e Account Opening Default Review System for the new accounts e Accelerating Review Processing after Oracle Financial Services Behavior Detection Framework alerts are created for the day Re Review Periodic Review Processing e Feedback Application EOD Processing e Configuration required for execution of batch Periodic Maintenance Activities e Clearing Staging Tables and Log Tables e Clearing of the log files related to previous batch executions e List Of Holidays e KYC Purging Utility Initial One time Activities The following sections describe the Initial One time Activities Managing Users KYC Administrator user has to be created for KYC related processing 14 KYC Administration Guide Release 2 0 Initial One time Activities Chapter 2 KYC Architecture Overview For more information on how to create users refer to the OFSAAI System Configuration amp Administration User Manual and Configuration Guide Excel Uplo
75. sible in the Batch execution screen after the KYC installation is complete After the installation is complete the user should login to the OFS KYC as the KYC Administrator and perform the steps mentioned in Resaving Runs on page 63 KYC Administration Guide Release 2 0 17 Initial One time Activities Chapter 2 KYC Architecture Overview Table 2 Scheduling Batches Criteria Remarks Timing of Execution of KYC The KYC batches should be executed only after Oracle batches Financial Services Alert Management System has completed the day s ingestion and alert generation process This ensures that the KYC will have the latest customer account and alert information available for Risk Assessment reference All the processing batches are EOD processing The default review execution should be scheduled as an EOD activity Sequence of Execution of The Processing of batch should follow the sequence KYC batches Deployment Initiation Processing For processing the Existing customers e EOD Processing Feedback Processing For processing after the entire DI processing batch is complete e Regular Processing For daily processing The feedback processing creates feeds for the account opening system and Oracle Financial Services Alert Management system Care should be taken to ensure that the feeds are scheduled as part of the data ingestion process in the account opening system and Oracle Financial Services Behavior Detec
76. sing e EOD Processing The following section provide the steps to resave the run The steps provided below are for resaving of Deployment Initiation Processing run Follow the same steps to resave the Regular Processing and EOD Processing runs Resaving Runs To resave runs follow these steps 1 Login to the OFS KYC as the KYC Admin user 2 Navigate to Rules Framework and click Designer The Rules Framework pop up window appears 3 In the pop up window click Run The RUN screen displays in the RHS Financial Services Analytical Applications Infrastructure ORACLE Piot Donan KY CHF feet Designer Rules Process ManageRun Figure 16 RUN screen 4 Click Open The Open a Run pop up window displays 5 Select the Base Line Run radio button 6 Click OK The Information Domains pop up window displays KYC Administration Guide Release 2 0 63 Resaving Runs Appendix C Configurability http 019 104 220 69112 0 seek PR2F ramework PR2 index jsp Windows Internet Explore Financial Services Analytical Applications Infrastructure ORACLE Mformabee Doman KvCNFO PARRA Segment KYCSEG Le Run Description Designer 4h KYCINFO Rules Hierarchies Process mi Run Condition Rui OD Process Condition ManageRun Process Condition Lal Open a Run Select the Run Type Base Line Run C Simulation Run SANE si l Figure 17 Information Domains 7 Click the highlight
77. sk Assessment Engine e Interface with Third Party Services e System Maintenance 8 KYC Administration Guide Release 2 0 KYC Modules Chapter 2 KYC Architecture Overview KYC Modules The following figure illustrates a High Level flow for the Real Time Review Process Account Opening OFS KYC Real Time Review Process Account Opening Customer Risk is assessed at the time of on boarding and through out the relationship period Risk Score Risk Category In complete Information Figure 7 Review Process Real Time Account On boarding The workflow steps may differ based on the type of review default or re review but the Risk Assessment process is the same KYC Administration Guide Release 2 0 9 KYC Modules Chapter 2 KYC Architecture Overview The following figure illustrates a high level flow for default review and re review processes OFS KYC Review Process New Existing Accounts CustomerRisk is assessed at the time of on boarding and through outthe relationship period In complete Information Batch Feed External Account Opening System Figure 8 Review Process New Existing Accounts 10 KYC Administration Guide Release 2 0 KYC Modules Chapter 2 KYC Architecture Overview The following figure illustrates a high level flow for the default review workflow OFS KYC Default Review Workflow 0 Figure 9 Regular Processing KYC Administration Guide Rele
78. ssessments during the algorithm based risk assessment process FN CCRCALC UPDDYNWT This function will update the Dynamic weight for all the risk assessments during the algorithm based risk assessment process RISKRATINGROAR This package is used for Real Time On boarding Risk Assessment 40 KYC Administration Guide Release 2 0 APPENDIX A This chapter covers the KYC Batch and the tasks within the batches This chapter discusses the following topics e Regular Processing e Deployment Initiation Processing e End of Day Processing Regular Processing Table 8 Regular Processing KYC Batches Task No Rule Name As configured Description Component Id Precedence Task1 FN_DEL_DATA_FRM_P RCNG TRANS FORM DATA Truncate the data from KYC pro cessing tables Task1 Task2 RvwSuspCust_RR LOAD DATA Reasons based on alerts gener ated in Oracle Financial Services Behavior Detection Framework Task2 Task3 RvwSuspAcct_RR LOAD DATA Reasons based on alerts gener ated in Oracle Financial Services Behavior Detection Framework Task3 Task4 RvwFreqCust_RR LOAD DATA Reasons based on alerts gener ated in Oracle Financial Services Behavior Detection Framework Task4 Task5 RvwFregAcct RR LOAD DATA Reasons based on alerts gener ated in Oracle Financial Services Behavior Detection Framework Task5 Task6 RvwCustSAR
79. system performs the risk assessment calculation based on the Customer Type For existing customers RAOR PASS2 is skipped Legal Entity Updates the acknowledgement with CER and CER Category e Correspondent Bank Updates the acknowledgement with CER and CER Category e Individual Finds all joint customers defined in the request If all of them are existing then finds the max CER and updates the acknowledgement with CER and CER Category Related updates are made in the Risk Assessment Summary and Risk Assessment Reasons tables Stage 2 Third Party Information Collection IDV and Watch Lists are initiated for the customer and the interested parties defined in the request IDV is triggered only when the Doc Verification Flag is N or Null for the customer and interested parties and only when there is no prior result available in the IDV results table WLS will be triggered for the customer and interested parties for every request even if the customer is opening more than one account on the same processing day Interested Parties of the customer definition in the context of RAOR processing Legal Entity Controlling e Correspondent Bank Controlling e Individual Only the New Joint Account Holders KYC Administration Guide Release 2 0 23 Regular Processing Chapter 2 KYC Architecture Overview Stage 3 RAOR Calculation Pass 2 If the RAOR Calculation is incomplete customer is a new customer then ROAR Risk Assessment is done
80. ta etait ld tet de eet s entibus 69 R n Rule PRZ rule Update Rule ttd Rate rer deat reote eere eerie ali 70 KYC Administration Guide Release 2 0 xi List of Tables xii KYC Administration Guide Release 2 0 About This Guide This guide provides comprehensive instructions for proper system administration and the daily operations and maintenance of the OFS KYC The logical architecture provides details of the KYC process for a better understanding of the pre configured application which allows you to make site specific enhancements using OFSAAI This chapter contains the following topics Who Should Use this Guide How this Guide is Organized Where to Find More Information Conventions Used in this Guide Who Should Use this Guide The Oracle Financial Services KYC Administration Guide is designed for Oracle Financial Services Installers and System Administrators Their roles and responsibilities as they operate within the Oracle Financial Services KYC include the following Oracle Financial Services KYC Installer Installs and configures the Oracle Financial Services KYC at a specific deployment site The Oracle Financial Services KYC Installer also handles customer specific enhancements or changes and accesses information about deployment specific configuration for example machine names port numbers and business metadata System Administrator Configures maintains and adjusts the system and is usually an empl
81. tallation specific parameters which do not vary with the jurisdiction This table has only one set of parameters for a particular installation For more information refer to the Configuration Guide KYC Administration Guide Release 2 0 15 Initial One time Activities Chapter 2 KYC Architecture Overview Configuring Rule Based Risk Parameters The default values for the Rule Based Risk Assessment Parameters are populated into the DB during Excel upload Parameters and Values for the DEEAULT jurisdiction are provided in the Excel data file The parameters are predefined and new parameters cannot be added However new values can be added for the parameters in the Excel data files before the upload process is complete or new values can be added and modified from the UI Rule Based Risk Assessment Parameters contains information about the values for parameters which are pre defined and the values for the parameters can vary according to the jurisdiction It is mandatory to update values for the tules for all the jurisdictions for which Rule Based Risk Assessment is used Defining the Re Review Risk Thresholds Default values for the Re Review Parameters are included as a part of the Excel upload This section describes the Application Re Review Parameters Appln ReReview Params and Vw Appln ReReview Params The OFS KYC comes with pre packaged rules based on which the Accelerated Re Review is triggered These rules are available in the App
82. te Date KYC Administration Guide Release 2 0 31 End of Day Processing Chapter 2 KYC Architecture Overview Watch List Entry Feedback The Watch List is generated for closed cases and where closure is recommended for the Account The records populated in the Watch List results table for a processing date are dumped into this file The file name is obtained by appending the processing date to GenWLSFeedback_ED Table 4 Watch List Feedback SL No Business Name Data Type 1 Entity Identifier Type String 2 Entity Identifier String 3 Watch List Identifier Referred from String Application parameter KYC WLS ENTRY FILE ID 4 Watch List Entry Description Text String Customer Risk Assessment Details This file contains the Customer ID and the Risk assessment details computed by the risk assessment engine The file name is obtained by appending the processing date to GenCustDetails ED This file is created for the Alert Management System to verify the Risk assessment details which were Auto closed on that day during processing or UI Closed by the investigation officer Table 5 Risk Assessment Details SL No Business Name Data Type 1 Customer ID String 2 Customer Effective Risk Score Number 3 Custom1 Date String 4 Custom2Date String 5 Custom3Date String 6 Custom Real String 7 Custom2Real String 8 Custom3Real String 9 Custom
83. teps 1 In the Watch List Result table update the High Risk Watch List Flag of the Case if any such entry exists 2 Update the risk scores and risk category into the Customer Master Table for the risk assessed customer 3 Update the risk assessment ID from which the risk scores have been updated into the Customer Master table 4 Determine the Next Re Review date for the customer based on the risk category 5 The risk assessments that are not auto closed are promoted to case for further investigation KYC Administration Guide Release 2 0 21 Real Time Account On Boarding Review Chapter 2 KYC Architecture Overview Lookback Period During Accelerated Re Review processing for certain rules the lookback period is specified The lookback period is the time period within which the OFS KYC can consider the alerts in the Alert table KDD_REVIEW in the Mantas schema For example if the lookback period is set to 90 days fot a rule then during execution the solution will look back up to 90 days to determine the list of alerts and to generate risk assessment reasons Real Time Account On Boarding Review The Real Time Account On Boarding Risk Assessment RAOR workflow is triggered by a request from an external account opening system The request format should be a Web Service Request Process Flow Request and Response Web Service A third party account service calls KYC Service on account opening and waits for a response
84. th the name of the task executed will be generated in the following path ftpshare STAGE KYCsource For Example GenCBSFeedback ED Loo KYC Administration Guide Release 2 0 69 Run Rule PR2 rule Update Rule Appendix A KYC Batches Run Rule PR2 rule Update Rule The logs for this type of task will be created in the path as follows Ofsaai Installed Area ficdb log runrule KYC12DOM 1224493633301 20121115 1 Task PR2 LOG Table 16 Run Rule PR2 rule Update Rule Component Description KYC12DOM This is the INFODOM on which the batch was executed 1224493633301 This is the ID of the RUN batch is created once the RUN is saved 20121115 This is the date on which the Batch was executed 1 The batch is executed for the first time on the same day Task1 This log file is for the Task1 of the batch PR2 This is a PR2 type of log Log file for the definition created through PR2 framework Promote to Case If any of the risk assessments are not promoted to a case refer to the table RA TO CASE ERROR present in the KYC Atomic schema for the reasons for not being promoted 70 KYC Administration Guide Release 2 0 ORACLE
85. tion Platform Listing Holidays in the OFSAAI Administration User Interface Use the OFSAAI Administration UI Administration gt Security Management gt System Administrator gt Holiday Maintenance to setup and maintain the holiday list for the financial institution Deployment Initiation Processing Based on the Implementation Requirement After installing KYC the existing customers are to be risk assessed and processed through KYC for which Deployment Initiation is required The Deployment Initiation Process helps the financial institution process the risk assessment of an existing customer once as a start up process and mark them for periodic review based on the CER score Deployment Initiation Processing can be done in a single slot or can be executed in multiple slots for example Number of Customers to be processed for managing the performance due to volume The pre requisite for triggering the process execution involves setting up the KYC related parameters correctly using the application parameter configuration UI Refer to Deployment Initiation Processing on page 47 for more information about the tasks within the Deployment Initiation processing batch 18 KYC Administration Guide Release 2 0 Daily Activities Chapter 2 KYC Architecture Overview Daily Activities Before starting the daily processing activities the processing date must be verified in the system using the Application Parameters screen under the K
86. tion related to the failure will be inserted into the am 1og file logfile which is present in the path Ofsaai Installed Area gt ficdb log Table 14 Shell script Transform data Component Description DT This is a product indication for the Data transformation type of log RunProc This indicated that the log is for running a procedure function KYC12DOM This is the INFODOM on which the batch was executed 1263964041287 This is the ID of the RUN batch is created once the RUN is saved 20121120 This is the date on which the Batch was executed 2 The batch is executed for the second time on the same day Task23 This log file is for the Task23 of the batch DT Definition name A log file will be created with the name of the DT definition cre ated Table 2 File Extraction of Data The logs for this type of task will be created in the path as follows Ofsaai Installed Area ficdb log extraction KYC12DOM 1263964041287 20121122 2 Task24 ext log Table 15 Table 2 File Extraction of Data Component Description KYC12DOM This is the INFODOM on which the batch was executed 1263964041287 This is the ID of the RUN batch is created once the RUN is saved 20121122 This is the date on which the Batch was executed 2 The batch is executed for the second time on the same day Task24 This log file is for the Task24 of the batch ext This means that the log files is for extraction type of task A log file wi
87. tionships Stg Fct Accounts Stg Fct Acct Cust Roles Stg Fct Cust Country Stg 22 KYC Administration Guide Release 2 0 Real Time Account On Boarding Review Chapter 2 KYC Architecture Overview Fct Cust Source Wlth Dtls Stg Fct Markets Served Stg e Fct Products Served Stg KYC Request Acknowledgement Acknowledgement details should be stored in the DB for communicating the acknowledgement to the external third party account opening system A negative acknowledgement with error information is sent if any of the following situations is encountered If the user name or password is incorrect m If mandatory information is missing m Ifa request contains an account with different Primary Customer Definitions Check against the Acknowledgement table In the above situation there is no need for an error code or error message The Flag s will be interpreted by the account opening system This checking is done on the data available in the staging tables for a specific Request ID and Customer Number Other information is optional Lack of availability will lead to dynamic weight calculation in risk assessment or non availability in the UI display The system records the acknowledgement details in the FCT REQUEST ACK DTLS table and also records the request in CUSTRVWDTLS and ACCTRVWDTLS tables if the customer is not an existing customer In the RAOR Pass 1 calculation if the customer is an existing customer the
88. ustAuth RR LOAD DATA Reasons based on change log Task10 Task11 Task12 summary in Oracle Financial Ser Task13 Task14 Task2 vices Behavior Detection Frame Task3 Task4 Task5 work Task6 Task7 Task8 Task9 Task15 CustldentificationAcc LOAD DATA Identify the customers for Risk Task15 tOpn assessment creation for New Accounts Task16 CustldentificationAc LOAD DATA Identify the customers for Risk Task16 cRvw assessment creation for Acceler ated re review customers Task17 CustldentificationPrdRvw LOAD DATA Identify the customers for Risk Task17 assessment creation for Periodic re review customers Task18 HoldRAldentification LOAD DATA Identify the Risk assessments Task15 Task16 Task17 which were cleared from HOLD Task18 status for Risk assessment pro cess Task19 FN CUST IP PRCNG TRANS Identify the interested parties for Task19 DR FORM DATA the risk assessed customers Task20 CreateRA LOAD DATA Creation of the Risk assessments Task20 Task21 RACreationAction LOAD DATA Log action for Risk assessment Task21 creation Task22 Init amp cctRvwDtls LOAD DATA Account Repository maintenance Task22 Task23 InitCustRvwDtls LOAD DATA Customer Repository mainte Task20 Task21 Task22 nance Task23 Task24 CreateSnpCust LOAD DATA Copy snapshot of risk assessed Task24 customer Task25 FN Regestration Check TRANS Identify if the risk assessed cus Task25 FORM DATA tomer data is latest or old for the risk assessment process Task26 AccountOpenD
89. vided by the customer for a parameter is not available then the system considers it as Others which would have a corresponding score in the static jurisdiction table If the customer has not provided any value fot a parameter then the system would go in for Dynamic weight to distribute the weight of this parameter across other parameters CER Score Sum value of the risk assessment parameter weight 100 Closure Updates After Risk Assessment some of the risk assessments are eligible for Auto Closure based on the following criteria e The User Review Flag of the risk category to which the risk score belongs should be set to N e The High Risk Watch List Flag of the Risk assessment should be set to N The difference between the present risk score and previous risk score should be less than the value specified in the parameter KYC CHG IN CUST RSK TOLERANCE For all the risk assessments that satisty the above set of conditions the recotds of the risk assessed customers in the KYC Master Customer Table Per Cust Rvwdtls is updated with all the parameters pertaining to the risk score calculation Subsequently the records of all the accounts associated with the risk assessed customer are also updated 28 KYC Administration Guide Release 2 0 Risk Assessment Chapter 2 KYC Architecture Overview with the risk scores The threshold values for Auto Closure can be altered by changing the value of the Application parameter mentioned
Download Pdf Manuals
Related Search
Related Contents
installationshandbuch für pc-p2hte 1. sicherheitsübersicht 2 取扱説明書 Toshiba IK-WD01A/3.3-12 surveillance camera Q -10 /2 0 F o nc tio nneme nt & Ins ta llatio n Manual de instrucciones Guía de usuario Arrancador GE AGS Philips myHomeOffice Floor lamp 69066/87/16 Le congrès Bedienungsanleitung Copyright © All rights reserved.
Failed to retrieve file