The decision of the Board of Directors to appoint authorized persons to manage the company’s accounts and limits of their powers.
The accounts of government units and public corporations:
- The approval of the competent authority to which the government unit is affiliated or of the general manager of the establishment or corporation, as the case may be, to open the account.
- Approval of the Federal or State-level Ministry of Finance as the case may be.
- Mandate specifying the names of the persons authorized to sign on the account and the limits of their powers signed by the head of the government unit or the Director General, as the case may be.
- Copy of the law under which the government corporation or unit was established.
Accounts of Non-profit organizations and associations:
- Certificate of registration from the competent authority. For organizations and associations registered outside Sudan, documents issued by the foreign Registration Authority and authenticated in Sudan shall be provided.
- A copy of the Constitution and the Regulations which govern and regulate the work of such entities.
- The decision to establish the Executive Committee and appoint the three officers certified by the Corporations' Registrar.
- A letter specifying the bank in which the checking (current) account is to be opened signed by the head or secretary and mentioning the names of the persons authorized to sign on behalf of the relevant party and the limits of their powers to use that account.
- Identify and verify the identity of donors and beneficiaries of the deposited and withdrawn funds.
15. Procedures to identify and verify the identity of legal arrangements:
a. Identification data includes: the name of the legal arrangement, headquarters address, if any, the purpose of the legal arrangement, the name of the settlor, the trustee, beneficiaries and anyone else who exercises ultimate control over this legal arrangement, phone numbers, the purpose of the business relationship, and any other information the organization deems necessary to be obtained.
b. Obtaining a copy of documents proving the authorization from the legal arrangement to a person representing them or the commissioning of natural persons to manage the account, in addition to the need to identify the authorized persons in accordance with the customer identification procedures stipulated in this Circular.
Identification of the beneficial owner:
16. In order to make sure whether the customer is acting on behalf of one or more beneficial owner, the institution shall request each customer when opening an account to sign an affidavit which discloses information about the beneficial owner of the business relationship to identify him. The institution can take other measures to determine the identity of the beneficial owner through any other sources as it deems necessary.
17. The institution shall identify the beneficial owners and take reasonable steps to verify their identity using reliable, independent source documents, data or information, such that the institution is satisfied it knows who the beneficial owner is. For legal persons and legal arrangements, this should include the understanding by the institution of the ownership and control structure of the customer.
18. The identification of the beneficial owner for legal persons and legal arrangements is carried out as indicated below:
a. For legal persons, the institution must identify each natural person who owns or controls, directly or indirectly, more than 10% of the legal person. If the institution fails to confirm that this person is actually the beneficial owner or finds that no natural person is exercising control through ownership, then the identity of each natural person who exercises control by other means shall be specified. In case this abovementioned specification is not possible, the institution must determine the identity of the person responsible for the management of the legal person.
For customers listed in the Khartoum Stock Exchange (KSE), the institution is not required to identify the shareholders or beneficial owners or to verify their identity. This procedure does not absolve the institution from obtaining copies of the documents required to verify the identity of the legal person as stated in paragraph (14) above.
b. For legal arrangements, the institution must verify the identity of the settlor, the trustee and the Secretary (if any), all beneficiaries, and any other natural person who ultimately exercises direct or indirect effective control over the legal arrangement.
Enhanced due diligence:
19. Institutions should examine, as far as reasonably possible, the background and purpose of all complex, unusual transactions, and all unusual patterns of transactions which have no apparent economic or lawful purpose. Where the risks of money laundering or terrorism financing are higher, institutions shall conduct enhanced due diligence, consistent with the risks identified. Institutions shall increase the degree and nature of monitoring of such business relationships, and determine whether those transactions or activities are suspicious. Institutions need to keep records for these transactions regardless of the decision taken, and make records available to the competent authorities and auditors upon request.
20. In addition to the regular CDD measures, the institution shall apply Enhanced CDD measures for high-risk business relationships. Examples of these procedures include:
a. Obtaining additional documents and information related to the customer and the beneficial owner, contact information and residence.
b. Obtaining additional documents and information related to specifying the profession, source of funds, the source and nature of wealth, business relationships with other institutions, the intended nature of the business relationship, and the purpose of intended or performed transactions.
c. Updating documents, information and data on customers and beneficial owners more frequently, and conducting a periodic review of the business relationship and enhanced monitoring of transactions.
d. Obtaining the approval of the senior management to establish/continue the business relationship.
21. The institution must apply enhanced due diligence procedures, according to identified risks, on business relationships and transactions with persons bearing the nationality of or residing in countries that do not apply the recommendations of the FATF or that do not apply them adequately. In high risk cases, the institution shall limit its transactions with such customers and consider the termination of the business relationship.
22. The institution must include in its policies efficient procedures for business relationships conducted without the customer being physically present, so that it is strict in the customer identification and verification process. Examples of these procedures include:
a. Requesting certification of documents presented by the customer when establishing a business relationship.
b. Requesting additional documents to verify their identity or contact information, wealth, source of funds, and other elements.
c. Obtaining the recommendation of an independent third party to identify the customer.
d. Putting restrictions on transactions of the account such as limiting the amount and type of transactions that can be executed.
e. Conducting ongoing enhanced monitoring of the business relationship to check if transactions appear to be unusual or suspicious.
V. Other controls to establish business relationships:
23. The institution is not allowed to open, retain, or deal with any numbered accounts.
24. The institution is not allowed to open or retain anonymous accounts or accounts under fictitious names.
25. Before establishing a business relationship with a customer, the institution shall verify that the customer’s name is not included in lists of defaulters or blacklisted customers issued by the CBOS. It shall not perform any transaction for a blacklisted casual customer. If the institution discovers that it had existing business relationships with blacklisted/defaulting customers before the entry into force of this circular, it should immediately file a Suspicious Transaction Report to the Unit.
26. Approval must be obtained from the branch manager or anyone acting on his/her behalf to enter into a business relationship with any customer.
27. No employee in any institution shall manage any account on behalf of a customer.
VI. Cases requiring special measures:
In addition to CDD measures stipulated in paragraph IV of this circular, the institution shall take special measures in the following cases:
Politically exposed persons
28. The institution shall develop an appropriate risk management system that determines whether a customer or beneficial owner is a PEP. This system shall include the following as a minimum:
a. Requesting a declaration from the customer and beneficial owner including relevant information.
b. Verifying the available information about the customer and beneficial owner.
c. Searching in commercial electronic databases for PEPs, if available.
29. If the institution establishes that a customer or beneficial owner is a PEP, it shall do the following:
a. If the PEP is a person that is or has been entrusted with a prominent public function in a foreign country:
- obtain approval from senior management before establishing or continuing a business relationship with such person;
- take reasonable measures to identify the source of wealth and source of funds;
- apply enhanced ongoing monitoring to the business relationship to know whether the transactions appear unusual or suspicious.
b. If the PEP is a person who is or has been entrusted with a prominent function in Sudan or by an international organization and considered as a high risk customer, the measures referred to under (a) above shall be applied.
30. The institution shall apply these special measures also to family members and close associates of such PEPs.
Correspondent banking
31. In addition to performing basic customer due diligence pursuant to Chapter IV, the institution shall take the following measures when establishing a business relationship with a respondent institution:
a) Gather sufficient information about the respondent institution to understand fully the nature of its business and evaluate, using publicly available information or information provided upon request, the reputation of the respondent institution and the level of supervision to which it is subject, including whether the respondent institution or any of its board members or owners of its controlling stake has been subject to a money laundering or terrorist financing investigation or regulatory action.
b) Evaluate the anti-money laundering and combating the financing of terrorism controls implemented by the respondent institution and verify their efficiency and adequacy.
c) Obtain approval from senior management before establishing a new correspondent relationship.
d) Clearly understand and document the AML/CFT responsibilities of each institution with regard to correspondent services.
e) If payable-through accounts services are provided, the correspondent institution should be satisfied that the respondent institution has performed CDD obligations on its customers having direct access to such accounts and is able to provide relevant CDD information about these customers when necessary.
f) Institutions must not enter into or continue a business relationship with a respondent institution that is a shell bank or that allows its accounts to be used by a shell bank.
g) File a written questionnaire showing the position of the respondent institution regarding compliance with local AML/CFT legislation and supervisory controls, standards of due diligence applied by the respondent institution to its customers, and the availability of effective AML/CFT internal policies and procedures at the respondent institution.
32. The above measures should be applied to cross-border correspondent banking procedures and similar relationships that have been created before the entry into force of this circular.
Wire transfers:
33. Scope of execution:
a. The provisions of this paragraph shall apply to domestic and cross-border wire transfers in any currency.
b. These measures do not apply to transfers resulting from transactions using payment cards, discount cards, or any other similar payment method. All these types of transactions must be given a unique reference number to track the transaction back to the originator and beneficiary.
c. These measures do not apply to transfers or settlements made between financial institutions where both parties of the transfer are financial institutions working each for its own interest.
Obligations of originating institutions:
34. The institution originating the transfer shall obtain: A- full information about the transfer originator, including: a- the name, b- the account number, and c- the address or national identity number, or customer identification number of date and place of birth, and B- complete information about the beneficiary, including: a- the name, and b- the account number used to process the transaction. In the absence of an account number for the originator or the beneficiary, the institution shall give a unique transaction reference number to the transaction.
35. The originating institution shall verify the accuracy of the information about the originator before sending the transfer, using official documents and information, and include in the transfer form all the data referred to in paragraph (34) above.
36. Where several transfers from a single originator are bundled in a batch file for transmission to beneficiaries, the batch must contain all of the information mentioned in paragraph (34) above, to permit traceability of the transaction in the hosting country. The originating institution shall include the originator’s account number or unique transaction reference number in the absence of an account number, provided that:
a. The institution has the ability to provide the beneficiary institution or competent authorities with all required information within three business days from the date of receipt of the request for information.
b. The institution responds immediately to any order issued by a competent law enforcement authority to access all required information.
c. Institution must be sure that no unusual transfers are sent in one bundle in situations that increase the risk of ML/TF.
37. The institution shall keep all data referred to in paragraph (34) above and the information and documents related hereto.
38. The institution shall not execute any wire transfer that does not comply with the requirements stipulated in paragraphs (34-37) above.
Obligations of beneficiary institution:
39. The beneficiary institution shall take reasonable measures, which may include post-execution monitoring or real-time monitoring, where feasible, to detect any wire transfers that lack the required originator or beneficiary information under paragraph (34) above.
40. If the identity of the beneficiary was not verified by the ordering institution when executing the transfer, the beneficiary institution shall identify and verify the customer’s identity and maintain information and documents in accordance with record keeping measures in Paragraph VII of this circular.
41. The beneficiary institution shall adopt efficient risk-based policies and procedures to deal with transfers that lack required information contained in paragraph (34) above and to determine when to execute, reject or suspect a wire transfer lacking such information. These procedures may include requesting missing information from originating financial institution. In case of failure to obtain the required information, the institution must take risk-based action, possibly including the rejection of the transfer, filing a suspicious transaction report, or determining appropriate follow-up measures.
Obligations of intermediary institutions:
42. Any intermediary institutions involved in executing a wire transfer without being its originators or beneficiaries should ensure that all data required in paragraph (34) above and annexed to the wire transfer is retained with it.
43. Where technical limitations prevent the required information from remaining with the wire transfer, the intermediary institution shall keep a record, for at least five years, of all annexed information, regardless of completeness or lack thereof, and it should be able to provide this information to beneficiary financial institutions within one business day from the date of request.
44. Intermediary institutions should take reasonable measures to identify wire transfers that lack required originator and beneficiary information and adopt risk-based policies and procedures for determining:
a. When to execute, reject, or suspend a wire transfer lacking required data; and
b. The appropriate follow-up action.
Other obligations:
45. Any institution engaged in fund transfer activities should keep an updated list of its agents, and make it available to inspection teams upon request.
46. The institution shall immediately terminate any relationships with any respondent institution that does not adhere to the provisions of this circular regarding wire transfers.
New technologies:
47. Institutions shall identify, assess, and take appropriate measures to manage and mitigate the risks of ML/TF that may arise as a result of the following:
a) the development of new products and new business practices including new delivery mechanisms for services;
b) The use of new or developing technologies for both new and pre-existing products.
When providing payment services through mobile phone, institution shall, for example:
a. Ensure that they obtain information on transfers stipulated in this circular when using this service in the transfer of money.
b. Ensure the ability to stop the service in the event of misuse, and include this condition in the service contract.
c. Exercise ongoing monitoring of transactions and retrieval of unusual transaction reports generated by the use of such service.
d. Set reasonable limits to deposit into accounts used in this service, as well as the value of the transaction that can be executed.
VII. Book and record keeping
48. Institutions must keep records and data, supporting evidence to the business relationships, banking operations and due diligence procedures, and the results of screening of unusual transactions, including originals or copies of identity documents that would be acceptable to courts in accordance with the legislation in Sudan. Such records must be sufficiently detailed to permit the reconstruction of each individual transaction (including the amounts and types of currencies used if any). Such records and information shall be provided to competent authorities in a timely manner. Records and data include the following:
a. All records obtained through CDD measures, including documents proving the identity of customers and beneficial owners, accounting files and business correspondence, for at least five years following the termination of the business relationship or the date of a transaction carried out by a casual customer, whichever is longer.
b. Records and data of transactions, both local and international, executed or attempted, for a period of at least five years from the date of the transaction or attempted transaction. These records shall be detailed in a way that permits the reconstruction of each individual transaction.
c. Records and information relating to STRs submitted to the unit and related documents for at least five years after the date of notifying the Unit, and records relating to criminal lawsuits until they are resolved, even if the legally set record keeping period is exceeded.
d. Records relating to risk assessments and any relevant information for five years from the date of the assessment or its update.
e. Documented records of all AML/CFT training programs that took place during a period of not less than five years back. These records shall include the names of the trainees and their qualifications and training institution both at home and abroad.
VIII. Reporting suspicion transactions:
49. The compliance officer at the institution is the person in charge of reporting suspicious transactions to the Unit pursuant to Article 6 of the AML/CFT Law, using the reporting template designed by the unit for this purpose.
50. The institution must report to the unit immediately whenever it suspects or has reasonable grounds to suspect that any funds constitute proceeds or transactions or attempted transactions are linked to money laundering or terrorism financing.
51. If any employee suspects there is a relationship between the transaction and proceeds of crime or ML/TF, he/she should inform the compliance officer and attach all the data and copies of documents related to that transaction.
52. The compliance officer shall provide the data to the Unit, and facilitate its access to records and information in order to carry out its functions.
53. Institutions, their directors and employees are prohibited from disclosing to any person, directly or indirectly, by any means, the fact that a suspicious transaction report or any related information is being or has been submitted to the Unit or that a money laundering or terrorism financing investigation is being carried out. This does not preclude disclosures or communications between and among directors and employees of the institution, and with lawyers, competent authorities, and the public prosecution in that regard.
54. Any institution and its directors or employees who in good faith report or provide information about a suspicious transaction to the unit shall not be subject to any civil, criminal, or administrative liability for violation of any prohibition on the disclosure of information required by a contract or law.
IX. Internal control system:
55. Institutions shall develop an internal AML/CFT system that is appropriate having regard to the institutions’ risk of money laundering and terrorism financing and the size of the business. The system shall include policies, procedures, internal controls, compliance, recruitment, training, and internal and external audit functions. Financial groups shall develop and implement policies and procedures to combat ML/TF at a group level, which should include mechanisms for exchanging information within the group and for maintaining confidentiality of the information exchanged.
The AML/CFT system shall include, as a minimum, the following:
a. Clear policy, procedures and internal controls to combat money laundering and terrorism financing, approved by the Board of Directors or Regional Director for branches of foreign institutions that are constantly updated, and that address the following as a minimum:
- A risk assessment at the institutional level and identifying a risk management system.
- Customer risk assessment, classification and identification of a risk profile.
- Customer acceptance and termination of the business relationship.
- Due diligence procedures and controls over delayed or enhanced CDD.
- Monitoring of operations and business relations.
- PEPs, correspondent banking relationships and wire transfers.
- Book and record keeping and updating.
- Suspicious transactions reports and non-disclosure of reporting.
- Compliance officer job description.
- Review mechanism and administrative controls.
- Standards of integrity and experience in the recruitment of staff.
- Continuous AML/CFT training programs for staff.
- The implementation of policies, procedures, controls and monitoring at the level of branches, subsidiaries and groups.
- Responding to requests from supervisory and other competent authorities and the Unit.
b. Appointment of a compliance officer and his deputy at the senior management level and working under the supervision of the Board of Directors, provided that they have appropriate academic qualifications and practical experience. The institution should inform the CBOS in the case of replacing either of them, and he/she shall have the following powers and responsibilities:
- Access to records and data as required for carrying out the work of the examination and review of systems and procedures established by the institution to combat ML/TF.
- To exercise his powers independently and be accountable to the Board of Directors in order to verify the extent of the implementation of the AML/CFT system in the organization.
- Receive information and reports on unusual or suspicious transactions to review and take the appropriate decision whether to notify the Unit or not, provided that the decision not to notify the Unit should be justified.
c. Developing plans and ongoing AML/CFT training programs for employees, board members, members of the executive management, supervisors and managers in co-operation with the compliance officer. These programs shall include AML/CFT techniques and how to detect and report offences and the developments in the area of risk assessment, mitigation and how to deal with suspicious customers.
d. Internal audit shall examine internal control systems to ensure their efficiency, and verify the staff’s and compliance manager’s execution of their responsibilities, and the extent of the staff’s compliance to policies and procedures to combat ML/TF and include all results in his report to the management.
e. A mechanism for external auditing, to ensure implementation of this circular, the adequacy of policies and procedures related thereto, and the inclusion of the results of that in his report to the management.
f. The existence of accurate procedures for examination and investigation to ensure the existence of a high fit and proper test measures in the selection of applicants when recruiting new employees. These measures shall include accessing candidates’ criminal records and considering any other information useful to confirm the absence of a conflict of interest or dishonesty or fraud.
X. Final provisions:
56. The external auditor of the institution shall notify the CBOS immediately upon discovery of any violation of this circular.
57. Institutions shall implement freezing orders, or refrain from carrying out transactions for persons specified by the authority designated to implement the resolutions of the Security Council of the United Nations pursuant to Chapter 7, on terrorism and the financing of terrorism and the financing of the proliferation of weapons of mass destruction, according to the provisions of Article 34 of the law.
58. Any person who violates this circular is subject to financial and administrative sanctions by law, and to penalties prescribed under the provisions of Articles 38 and 41 of the law.
This Circular shall come into force as of this date,
On behalf of Central Bank of Sudan
Elharam Ahmed Mohamed Mokhtar
Dr. Nagwa Sheikh Eldin Mohamed
Financial institutions directorate
Public Administration for Banking System Regulation and Development