Ethics, Legal, Compliance & Risk

Anti-money laundering (5)

  • Compliance vs. Legal
  • Compliance as a process, a organization unit and a function
  • Supervision and sanctions
  • National law and international regulations
  • Process and phases of money laundering
  • History of anti-money laundering
  • Legal implications of money laundering
  • Predicate offenses
  • International regulations in the fight against money laundering
  • AML scenarios and cases
  • Due diligence obligations of financial intermediaries
  • Dimensions of identification obligations
  • Know-your-customer (KYC)
  • Risk-based monitoring
  • Suspicion of money laundering event
  • Rules and principles of money laundering prevention
  • Obligations when entering client relationships
  • Identification of clients
  • Determination of beneficial owners and controlling persons
  • Increased risks
  • AML scenarios and cases
  • Risk classification
  • Business relationships with high-risk clients, beneficial owners and controlling persons
  • Politically exposed persons (PEPs)
  • High-risk transactions
  • Ongoing monitoring of client relationships
  • Suspicion of money laundering and involvement of Compliance
  • AML scenarios and cases

Codes of conduct (4)

  • Principle of equal treatment of market participants
  • Restrictions to proprietary market activities of employees
  • Areas of confidentiality
  • Insider information
  • Market manipulation
  • Rule violations and sanctions
  • Different types of gifts
  • Procedures to deal with gifts
  • Guidelines to deal with inappropriate gifts
  • Policy for gifts to clients
  • Scenarios and cases
  • Reputation and reputational risks
  • Principles to safeguard reputation
  • Legally permitted vs. socially tolerated behavior
  • National and foreign standards
  • Purpose and principles of conflict of interest policies
  • Avoidance of conflicts of interest
  • Disclosure and approval of conflicts of interest
  • Information barriers (Chinese Walls)
  • Cases and scenarios

Data security and confidentiality (2)

  • Principles of data protection
  • Correct handling of information and data
  • Classification of information
  • Proper handling of devices
  • Use of E-mails, internet and mobile phones
  • Working outside of the office
  • Use of passwords
  • Principles of confidentiality
  • Objectives and scope of data security
  • Bank client confidentiality
  • Commercial secrecy
  • Outsourcing and offshoring

Investment Suitability (1)

  • Rules of conduct: honesty, good faith, professionalism
  • Appropriateness and suitability
  • Risk categorisation: risk capacity and risk propensity
  • Opting up and opting down
  • Financial products to be offered to different types of client
  • Place of residence of the client
  • Execution only, asset management contract and advisory mandate

Automatic exchange of information in tax matters (AEOI) (1)

  • Common reporting standard
  • AEOI mechanism
  • Participating countries in AEOI
  • Communication with clients
  • AEOI scenarios and cases

Cross-border and FATCA (1)

  • Principles of cross-border transactions
  • Risks arising from cross-border business
  • FATCA principles
  • FATCA reporting models
  • Criteria for US person
  • Changes in US person status

Fraud Awareness (1)

  • Characteristics of economic crimes
  • Types of fraudulent action
  • Liability and sanctions
  • Preventive measures
  • Fraud scenarios and cases

Fit for FinSA (1)

  • Content and rationale of FinSA
  • Client protection
  • Financial services within the scope of FinSA
  • Client segmentation
  • Client profiling
  • Assessment of appropriateness and suitability
  • Pre-contractual information
  • Basic Information Document and prospectus duty
  • Execution – codes of conduct for transparency and diligence in client orders
  • Documentation and accountability
  • Applicability of MiFID in Switzerland

Federal Act on Data Protection (1)

  • Aim and purpose of the Data Protection Act
  • Important terms of the Data Protection Act
  • Key principles of data processing
  • Important measures to ensure data security

Try our e-learning

Are you interested in getting to know our e-learning platform? Then contact us for a demo or trial access.

Get in Touch