Below is a practical, end-to-end guide you can use to design and run a sanctions-screening program for customers. It covers what to screen, when and how to screen, technology and matching methods, handling hits, governance and audit, and common pitfalls.
- Scope: what to screen
- Sanctions lists: national and multilateral lists (e.g., U.S. OFAC SDN/Specially Designated Nationals, EU consolidated list, UN sanctions, UK HMT, plus other high-risk jurisdictions’ lists). Also country/sectoral/transaction-based sanctions.
- Related lists: asset-freeze lists, denied-party lists, trade-control lists.
- Politically exposed persons (PEPs) and adverse media are related but separate risk streams—consider integrating or linking them to sanctions screening.
- Entities, individuals, vessels, aircraft, addresses, companies, aliases, trade names, and known associates/beneficial owners.
- When to screen (timing / cadence)
- Onboarding: mandatory screening before account opening or first transaction.
- Real-time/at-transaction: screen before executing transactions that could trigger sanctions exposure.
- Periodic rescreening: customers and watchlists change — schedule rescreening based on risk (e.g., monthly for high-risk, quarterly/annually for low-risk).
- Event-driven: rescreen when adverse media appears, ownership changes, nationality changes, or new sanctions announcements.
- Data you should collect
- Full legal name, aliases, former names, trade names
- Date of birth (for individuals), corporate registration number, tax ID, national ID, passport number (where available)
- Address(es), phone, email
- Country of nationality and residence
- Ultimate beneficial owners (UBOs) and ownership chain
- Relationship type (owner, director, signatory) and role
- Screening approach and matching methods
- Exact match for unique identifiers (sanctions ID, passport, registration number) where available.
- Fuzzy / probabilistic matching for names: phonetic algorithms (Soundex, Metaphone), edit-distance (Levenshtein), tokenization, n-gram, nickname dictionaries, and transliteration handling (Cyrillic/Arabic/Chinese).
- Multi-attribute matching: combine name similarity with DOB, country, alias, registration number to reduce false positives.
- Normalization: remove punctuation, standardize diacritics, expand common abbreviations/titles, standardize word order for corporate names (e.g., “Ltd,” “Inc”).
- Weighting/scoring: produce a single match score from combined attributes; apply thresholds for automatic clearance, manual review, and reject/hold.
- Watchlist sources must be canonicalized and kept updated.
- Sources of watchlists and updates
- Use authoritative primary sources where possible (OFAC, UN, EU, UK, national authorities).
- Supplement with commercial consolidated lists/vendors that aggregate, normalize, translate and provide change feeds and APIs.
- Maintain a documented list of sources, update frequency, and an automated ingestion pipeline (API/pull/FTP/SFTP).
- Keep historical versions to support investigative/audit requests.
- Technology and integration options
- Commercial screening solutions (SaaS/APIs) — pros: maintained lists, built-in fuzzy logic, workflows, audit trails. Cons: cost and vendor reliance.
- Open-source libraries + in-house list ingestion — pros: control and cost; cons: upkeep and tuning overhead.
- Hybrid: use third-party list feed and build in-house matching/workflow.
- Integrate screening into CRM/KYC onboarding, transaction processing, and transaction-monitoring systems via APIs/webhooks.
- Logging and immutable audit trail: capture inputs, list versions, match scores, reviewer decisions, timestamps, and reviewer identity.
- Handling hits (alert workflow)
- Triage: automatically discard low-score false positives; escalate medium/high-score to compliance analysts.
- Investigate: compare identifiers (DOB, registration ID), corroborate with source documents, check sanctions-list specifics (date of designation, scope, identifiers, known aliases).
- Decision outcomes: Clear (no match), False positive (documented), Potential match (escalate to sanctions officer), Confirmed match (reject/terminate and freeze assets if required).
- Reporting/filing: For confirmed matches, follow legal/regulatory obligations (e.g., file a blocked/property report to regulator — e.g., OFAC in US — and do not facilitate prohibited transactions). Follow jurisdiction-specific mandatory reporting timelines and procedures.
- Recordkeeping: retain evidence of investigations and filings for required retention periods.
- Escalation and legal requirements
- Define clear escalation matrix and SLAs (e.g., initial review within X hours, final decision within Y days for high-risk matches).
- Appoint a sanctions/financial crime officer with authority to block/terminate accounts and submit government reports.
- Know jurisdiction-specific rules (e.g., U.S. persons must comply with OFAC regardless of where the target is located). If you operate cross-border, ensure local legal reviews for obligations in each jurisdiction.
- Risk-based policies and controls
- Use a risk-rating framework to determine screening frequency and depth (higher-risk customers: non-resident, politically exposed, certain industries/jurisdictions).
- Document policies for screening thresholds, escalation, acceptable evidence, de-listing and false positive handling.
- Conduct periodic testing and independent audit of the screening program.
- Ongoing monitoring and maintenance
- Monitor regulatory changes and new sanctions designations; ingest change feeds immediately.
- Tune matching thresholds and rules to control false positive/negative rates. Track metrics: alerts per 1,000 customers, false positive rate, time-to-resolution, number of confirmed matches.
- Maintain an inventory of all data sources, tools, workflows and owners. Conduct regular training for analysts.
- Practical controls to reduce false positives without increasing risk
- Use multi-attribute matching (name + DOB + country + ID).
- Exclude benign name collisions (e.g., common names) by requiring additional corroborating data before escalation.
- Maintain a whitelist/false-positive suppression list only after documented investigation and with re-check policy (e.g., re-test suppressed names on list updates). Whitelists should be auditable and periodically reviewed.
- Sample minimal workflow
- Collect KYC data → Normalize and pre-process → Screen against consolidated watchlists in real time → If score < low threshold: clear → If score between low and high: create alert for manual review → If score >= high threshold: automatically hold transaction and notify sanctions officer → Investigate with documents and list descriptors → Decide (clear / file report / block/terminate) → Log results and report to regulator if required.
- Metrics and KPIs to track
- Number of screenings per day; alerts generated; percent escalated; percent confirmed matches; average time to close an alert; false positive rate; compliance SLA adherence.
- Governance, audit, and training
- Maintain written policies, procedures, and training for front-line and compliance staff.
- Perform independent audits and testing (e.g., sample true positive and false negative testing).
- Ensure secure access controls for screening systems and segregation of duties.
- Common pitfalls to avoid
- Relying on a single list or infrequent updates.
- Ignoring transliterations/nicknames and non-Latin scripts.
- Excessive false positives with no tuning — leading to alert fatigue.
- Poor documentation of decisions and whitelists.
- Failing to coordinate with legal for complex or cross-border matches.
- When to get legal/regulatory advice
- If you confirm a match that may require blocking assets or filing a regulatory report.
- When operating across jurisdictions with potentially conflicting legal obligations.
- For high-risk or ambiguous cases (for example, a name that matches a listed person but identifiers differ).
- Quick checklist to implement immediately
- Inventory which lists you must comply with and set up automatic feeds.
- Integrate screening into onboarding and transaction processing.
- Decide matching thresholds and establish an analyst workflow.
- Appoint a sanctions officer and document reporting procedures.
- Log everything and implement periodic rescreening and tuning.
If you’d like, I can:
- Suggest specific commercial vendors and compare features (pricing, API, languages, false-positive reduction) tailored to your industry and region.
- Draft a sample policy, alert workflow, or investigation checklist you can adapt.
Which (if any) of those would you like next?