There is an increasing wave of vulnerabilities on the part of financial institutions and DNFBPs to cybercrime and the sources of threats and vulnerabilities are from;
The use of Artificial Intelligence (AI) in KYC/CDD management relies more on Natural Language Processing (NLP) and supervised machine learning techniques. Each of these technologies has specific uses and NLP, in particular, is starting to come into widespread use in helping to analyze amorphous content, such as adverse media, also called negative news. Together with machine learning, NLP-based AI can read such articles and perform a range of tasks, including extracting metadata, identifying entities that are referred to, and understanding the intent or purpose of specific parts of the document. This compliance practice is known as;
In this era of deep social media penetration, a person’s footprint gathered through Google, Facebook and other social networks – can provide valuable information about an individual that cannot be gleaned from other sources. This method of KYC/CDD process is known as;
The best approach to be adopted by a financial institution or DNFBP to fulfill expectations in relation to Consumer Protection is by;
Biometric technology is one of the tools employed by financial institutions and DNFBPs in the management of KYC/CDD. All the following are components of biometrics except;
The following are utilized to perpetrate cybercrime in relation to properties except;
In Information and Communication Technology (ICT) crimes, the computer is used to commit the following crimes except;
A regulation was passed by the European Parliament and Council of the European Union on 14/April/2016. It became effective on 25th May, 2018. The regulation covers data controllers, data processors and data subjects within the EU. It is also relevant to those outside the EU if they process data on EU residents. The only exemption is for those data that concern national securities by EU Law Enforcement Agencies. The acronym for this regulation is known as;
Information and Communication Technology (ICT) has been very useful to humanity and it has also been used wrongly to perpetrate various crimes which have been a source of major concern in the world. What is this type of crime that is committed daily called?
The following are the attributes of a blockchain except;