Suspicious Activity Monitoring - What Is It & Why Do Banks Do It? (2024)

  • A
  • B
  • C
  • D
  • E
  • F
  • G
  • I
  • L
  • M
  • N
  • O
  • P
  • R
  • S
  • T
  • U
  • V
  • W
  • X

Account Takeover

Similar to identity theft, this type of fraud happens when an unauthorized individual gain access through online banking applications, capturing the account information to create and write bad checks.

Adverse Action

An adverse action notice is a document sent to a loan applicant stating a bank’s rationale for denying a loan. It may also contain a counteroffer, such as a lesser amount or a request for an approved co-borrower.

Aging Exceptions

The term “aging exceptions” refers to a group of critical exceptions that have not been resolved within a reasonable amount of time.

Altered Checks

Altered check fraud occurs when a fraudster changes the amounts and Payee from a stolen check.

Audit and exam prep is a process that financial institutions go through in order to adequately prepare for upcoming audits and exams.

Authorized Signer Form

An authorized signer form is a document that allows an account holder to grant a range of clearance levels to individuals to perform certain functions within a bank account.

Share via:

Suspicious activity monitoring is the procedure of identifying, researching, documenting—and, if necessary, reporting—an account holder’s banking pattern when it indicates possible illegal behavior. This practice is done to both manage a bank or credit union’s risk and comply with regulations.

Examples of suspicious activity include:

  • Unusual Large Business Deposits of Cash: Large amounts of cash regularly deposited into an account for a company that is not normally a cash business.
  • Personal Accounts with Suspicious Activity: A personal banking account that is established with a small deposit but regularly has large sums of money flowing through it.
  • Avoidance of CTR: Multiple deposits in cash, each just below $10,000. This attempts to avoid the need for a currency transaction report, or CTR, to be completed. (The CTR form is designed to deter money laundering and is required when a customer seeks to either deposit or withdraw more than $10,000 in a single transaction.)

How is Suspicious Activity Monitoring Initiated?

The initial burden of suspicious activity monitoring has traditionally fallen on frontline staff at financial institutions. The teller alerts a supervisor or manager, and then an investigation is conducted. In some instances multiple departments may be involved in researching an account. A suspicious activity report (SAR) would then be completed if warranted.

Some banks and credit unions are now also using features in their core software system and other electronic document management systems to delineate parameters that automatically trigger a suspicious activity notification. This is especially important for larger institutions with multiple branches; suspicious activity would otherwise be difficult to pinpoint if transactions were spread across a variety of locations with a number of tellers.

A Bank’s Responsibilities with SARs

Once an SAR is generated, a financial institution is required to file it with the Financial Crimes Enforcement Network (FinCEN) and retain all associated documentation for a five-year period, either as a hard copy or electronically. Auditors will also likely request SAR files, so it is imperative that these records be complete and easily retrievable.

Continue reading about SAR documentation best practices.

Tracking Resources

For more information about bank tracking and management, be sure to check out our extensive resource library with free spreadsheets, whitepapers, and eBooks.

Searching for more banking definitions? Check out our banking definitions page.

Explore more resources

Information Life Cycle Management: Meaningful Process Automation

In a world where data reigns supreme, it is imperative that banks and credit unions, regardless of their size, effectively manage information throughout its life cycle. Each stage of this cycle, from inception to disposal, presents distinct challenges and...

Read More »

eBook: NXT Business Digital Banking

Small business (SMB) account holders are turning to desktop banking and mobile applications to manage day-to-day transactions and simple payments. However, many find their digital banking needs unmet. Larger financial institutions often offer products and...

Read More »

Remote Deposit Capture (RDC) eBook

Remote deposit capture (RDC) ranks as a significant feature of modern banking. In fact, a San Global Research industry report projects the RDC market to grow at a compounded rate of 5.8% through 2032. As the banking industry continues its digital...

Read More »

Related articles

Monday 24 June 2024

Gaining a Holistic View of Banking Relationships with AccuAccount

Suspicious Activity Monitoring - What Is It & Why Do Banks Do It? (4)

Jenn Mitchell,
Vice President Sales, AccuAccount

Banking relationships can be incredibly complex. After all, one commercial customer might be connected to dozens of entities, loans, and accounts. To see the bigger…

Read the Blog

Monday 17 June 2024

Enhancing a Financial Institution's Information Lifecycle Management Strategy with Process Automation Solutions

Suspicious Activity Monitoring - What Is It & Why Do Banks Do It? (5)

Wendi A. Klein,
Vice President, Marketing & Communications

In the dynamic landscape of Information Lifecycle Management, process automation solutions play a pivotal role. These solutions streamline workflows, from data creation to disposal, ensuring…

Read the Blog

Wednesday 12 June 2024

4 Tips for Faster, Easier Loan Management Audits

Suspicious Activity Monitoring - What Is It & Why Do Banks Do It? (6)

Jenn Mitchell,
Vice President Sales, AccuAccount

Audits and exams are stressful—and time-consuming. Preparing for an audit or exam involves a lot of document-related activities, which is why a system like AccuAccount…

Read the Blog

Wednesday 29 May 2024

The Importance of Account Holder Education: Best Practices that will Keep Digital Banking Users and Your Institution Safe from Fraudsters

Suspicious Activity Monitoring - What Is It & Why Do Banks Do It? (7)

Debbie Eshbaugh,
Senior Product Manager

Financial institutions often hesitate to enforce complex password requirements and regular password changes in their security policies due to concerns about inconvenience, which could lead…

Read the Blog

Tuesday 21 May 2024

Is Inefficient Loan File Management Costing You $100K+ Per Year?

Suspicious Activity Monitoring - What Is It & Why Do Banks Do It? (8)

Jenn Mitchell,
Vice President Sales, AccuAccount

Change often comes with a cost. For financial institutions looking to improve their existing loan file management workflows, this cost may involve acquiring software, implementing…

Read the Blog

Monday 13 May 2024

Unraveling the Complexity: How ECM/EIM Solutions Tackle Information Chaos

Suspicious Activity Monitoring - What Is It & Why Do Banks Do It? (9)

Cameron Marks,
Director, Product Management

In today's digital age, data is often hailed as the new currency. However, this surge in data production has given rise to a new challenge…

Read the Blog

Thursday 9 May 2024

Beyond the Screen: The Value of In-Branch Banking for Young Consumers

Suspicious Activity Monitoring - What Is It & Why Do Banks Do It? (10)

Wendi A. Klein,
Vice President, Marketing & Communications

Is in-branch banking regaining popularity? Bank and credit union leaders should not count the branch out just yet. In fact, some of the largest institutions…

Read the Blog

Tuesday 30 April 2024

Suspicious Activity Monitoring - What Is It & Why Do Banks Do It? (11)

Jenn Mitchell,
Vice President Sales, AccuAccount

Banks and credit unions need accurate, reliable, and easy-to-understand exception reports. However, pulling exception data together can involve considerable administrative work for back-office staff. Financial…

Read the Blog

Suspicious Activity Monitoring - What Is It & Why Do Banks Do It? (2024)

References

Top Articles
Latest Posts
Article information

Author: Greg O'Connell

Last Updated:

Views: 6065

Rating: 4.1 / 5 (42 voted)

Reviews: 81% of readers found this page helpful

Author information

Name: Greg O'Connell

Birthday: 1992-01-10

Address: Suite 517 2436 Jefferey Pass, Shanitaside, UT 27519

Phone: +2614651609714

Job: Education Developer

Hobby: Cooking, Gambling, Pottery, Shooting, Baseball, Singing, Snowboarding

Introduction: My name is Greg O'Connell, I am a delightful, colorful, talented, kind, lively, modern, tender person who loves writing and wants to share my knowledge and understanding with you.