Connect with us

Hi, what are you looking for?

Datanamix News

Navigating the Latest FICA Frontier: FIC Directive 8 – Employee Screening  

Navigating the Latest FICA Frontier: FIC Directive 8 - Employee Screening
Navigating the Latest FICA Frontier: FIC Directive 8 - Employee Screening

Directive 8 aims to ensure that companies check the skills and honesty of both potential and current employees. It also requires screening employee details against financial sanctions lists to prevent money laundering, terrorist financing, and proliferation financing risks. 

So, as a business, what do you need to know? 

Take a Risk-based Approach:  

Whilst all employees must be subject to scrutiny, not all employees present the same level of Money Laundering (ML) / Terrorist Financing (TF) / Proliferation Financing (PF) risk. An accountable Institution must determine the level of risk an employee role poses and ensure that the screening applied is proportionate.  
 
As such, where the Company identifies a higher risk of ML/TF/PF based upon the employee role, the Company should apply more stringent competency and integrity screening and seek to mitigate any identified risk. 
 
The Company asserts to identify and verify employees and collect information and evidence of sufficient quantity and quality to be able to assess the potential level of ML/TF/PF risk presented. 

The new FICA requirements 

With the FIC Act comes a new set of requirements that all accountable institutions need to adhere to. 

  1.  Prospective and current employees are screened for competence and integrity before their appointment and on an ongoing basis in a risk-based manner. 
  2. Prospective employees and current employees’ information is scrutinised against the targeted financial sanctions (TFS) list to identify, assess, monitor, mitigate, and manage the risk of money laundering (ML), terrorist financing (TF), and proliferation financing (PF). 
  3. The institution must provide for how both types of screening will be conducted and record it in the institution’s Risk Management and Compliance Programme (RMCP). 
  4. Records of the outcome of both types of screening must be kept. 
  5.  The FIC or other supervisory bodies can request the institution to provide the records relating to the manner and outcomes of both types of screening. 
  6.  Public Compliance Communication 55 guides how to comply with these requirements and supports Directive 8. 

So, when and how often should this be done? 

  1. Before hiring, the company must screen all potential employees for their skills and honesty. 
  2. Directive 8 suggests that screening employee information should happen at the onboarding stage and reviewed regularly according to the company’s RMCP.  
  3. As per your RMCP, you should check employees in higher-risk roles more often than those in medium or lower-risk roles when screening them.
  4. According to FIC, if an employee’s role poses a high ML/TF/PF risk, the company should conduct competency and integrity checks annually at least. 
  5. The company might screen low-risk employees every five years, medium-risk employees every three years, and high-risk employees annually.

How do we assist with Directive 8 compliance?

At Datanamix, we understand the difficulties that come with constant changes in regulations and laws that your company needs to adhere to.  As a registered Credit Bureau and specialists in FICA and KYC, we are here to assist and support you on your compliance journey.  

The evolution of FICA Automation 

Maintaining compliance with the FICA Act can be a daunting task for medium to large companies, especially when dealing with a large number of people who need to be screened and monitored.  

This includes onboarding new customers and employees and maintaining compliance with existing ones. Not only are the resources required for achieving and maintaining compliance expensive, but keeping track of customers and employees who need to be continuously monitored is difficult. 

This is where KYC Infinite comes in. 

KYC Infinite is designed to solve siloed KYC and continuously monitors customers and employees throughout their entire life cycle. With KYC Infinite, you only need to deal with one supplier, one API string, and one solution for all your data requirements. 

There are three different options when it comes to KYC Infinite, namely: 

1. KYC Infinite – Batch  

The batch API solves for legacy customer data, which offers complete automation of the due diligence requirements ideal for the account management space.  

Our API caters for the golden source data processing, decisioning, reporting and all aspects required to effectively solve for ongoing KYC. 

Our API provides the ability to securely call on the below data assets: 

KYC Infinite Live and Monitoring will be available soon. In the meantime, we can provide you with more information: 

2. KYC Infinite – Live  

KYC Infinite Live caters for the account origination and account opening stage of the customer life cycle. The API can perform real-time enquiries on all data assets and includes AI-driven decision-making to meet end-to-end KYC requirements. 

The below data assets are available for live data: 

  • DHA – Identity information 
  • Address data, source data, and geo-coded addresses 
  • Contact details 
  • Employment, occupational data 
  • AI-led Source of funds 
  • AML – DPEP, FPEP, DPIP, FPIP Sanctions & adverse media screening 
  • AML conclusive matching 
  • Reporting 

3. KYC Infinite – Monitoring  

Our solution-driven automation can host and maintain millions of records in a private petitioned cloud. To ensure smooth integration into any platform or core system within the client’s environment, we have set up the API to return delta values.

Interactive front-end dashboards are also available to clients to receive detailed reporting and insights.

The below data assets are available for monitoring: 

  • Identity Data – Department of Home Affairs 
  • Address and address source data 
  • Contact details 
  • Employment, Occupation 
  • AI-led source of funds 
  • AML – DPEP, FPEP, sanctions and adverse media screening 
  • AML conclusive matching 
  • Reporting 

If you want to learn more about KYC Infinite, contact us 

You May Also Like

Datanamix News

Proactively planning for your KYC review for 2025 is a strategic move that ensures your company is well-prepared to meet regulatory standards. This proactive...

Datanamix News

Smishing, a combination of SMS and phishing, is becoming an increasingly common threat in the digital landscape. In a typical smishing attack, a cybercriminal...

Datanamix News

Deepfake is manipulated video, audio, or images generated by artificial intelligence (AI) to imitate real people, often with convincing accuracy. Deepfakes have become a...

News Watch

The private sector will be tapped for expertise needed to get South Africa off the Financial Action Task Force (FATF) grey list and to prosecute complex...

Datanamix News

goAML is a comprehensive, integrated software solution created by the Financial Action Task Force (FATF) to combat money laundering and the financing of terrorism.  ...

Datanamix News

When it comes to biometric security, one question frequently asked is, “Is Facetec safe?” Facetec has become a well-known name in the field of...

Datanamix News

Terrorist organisations heavily depend on financial resources to support their operations, including recruiting and training members, obtaining weapons, and carrying out attacks.  Money laundering...

News Watch

South Africa should scrap its driving licence card and vehicle licence discs and replace them with digital-only permits that never expire. “There is no...

News Watch

The Financial Intelligence Centre (FIC) appeal board dismissed an appeal lodged by Kunene Ramapala Incorporated, a firm of attorneys, after it received a R7.8...

Datanamix News

Credit management in South Africa plays a crucial role in maintaining the economy’s health. As businesses and individuals rely heavily on credit to fuel...

Copyright © 2023 - Datanamix
Disclaimer: The information in this BLOG is provided for general informational purposes only and is the opinion of the author only. No information contained in this blog should be construed as legal advice from pbVerify or the individual author, nor is it intended to be a substitute for legal counsel on any subject matter. No reader of this blog should act or refrain from acting on the basis of any information included in, or accessible through, this blog without seeking the appropriate legal or other professional advice on the particular facts and circumstances at issue.