{"id":756,"date":"2026-01-28T11:40:32","date_gmt":"2026-01-28T11:40:32","guid":{"rendered":"http:\/\/axilthemes.com\/themes\/axilnews\/?p=756"},"modified":"2026-02-06T11:26:35","modified_gmt":"2026-02-06T11:26:35","slug":"enhanced-due-diligence-edd-an-overview","status":"publish","type":"post","link":"https:\/\/grcfincrimetoday.org\/index.php\/2026\/01\/28\/enhanced-due-diligence-edd-an-overview\/","title":{"rendered":"Enhanced due diligence (EDD): An overview"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row][vc_column][vc_column_text css=&#8221;&#8221;]<\/p>\n<h1 class=\"article-hero__title\">Enhanced due diligence (EDD): An overview<\/h1>\n<p>&nbsp;<\/p>\n<p><span data-contrast=\"none\">These should be worrying statistics for risk professionals charged with maintaining the financial well-being and the reputational integrity of their organizations. Financial services firms need to be particularly vigilant, since they\u2019re required to comply with <\/span><a href=\"https:\/\/legal.thomsonreuters.com\/blog\/5-essential-steps-for-kyc-aml-onboarding-and-compliance\/\"><span data-contrast=\"none\">anti-money laundering (AML) and know-your-customer (KYC) regulations<\/span><\/a><span data-contrast=\"none\"> established to crack down on global financial crime and the financing of terrorist activities. But in fact, numerous companies in other industries need to be on guard against questionable customers, especially if they do significant business overseas. The <\/span><a href=\"https:\/\/legal.thomsonreuters.com\/blog\/what-is-identity-verification-an-overview\/\"><span data-contrast=\"none\">cost of not knowing one\u2019s customer<\/span><\/a><span data-contrast=\"none\">can be very high.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">All this means that risk professionals across many industries should familiarize themselves with <\/span><span data-contrast=\"auto\">enhanced due diligence. EDD has become an essential tool for organizations to protect themselves against financial crimes and regulatory violations in an increasingly complex global business environment. Many organizations\u2014particularly those in financial services\u2014already have at least some knowledge of EDD. Other businesses may be looking to better protect themselves from exposure to fraud or other financial crimes. Here we\u2019ll provide both an introduction to EDD and a look at current best practices.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<h2 id=\"heading-1\">What is enhanced due diligence?<\/h2>\n<p>Enhanced due diligence (EDD) is a more thorough and rigorous level of background investigation conducted on higher-risk business relationships or transactions. It goes beyond <a href=\"https:\/\/legal.thomsonreuters.com\/blog\/due-diligence\/\">standard due diligence<\/a> and involves collecting additional information, verifying sources more extensively, and conducting deeper analysis to better understand and mitigate potential risks.<\/p>\n<p>Enhanced due diligence typically involves:<\/p>\n<ol>\n<li>More extensive verification of the identity, ownership structure, and business activities of the parties involved<\/li>\n<li>Detailed examination of the source and legitimacy of funds<\/li>\n<li>More frequent monitoring of transactions and business relationships<\/li>\n<li>Additional checks on politically exposed persons (PEPs) and their associates<\/li>\n<li>Investigation of adverse media coverage and reputation<\/li>\n<li>Review of regulatory compliance history and legal issues<\/li>\n<\/ol>\n<p><span data-contrast=\"none\">It is <\/span><span data-contrast=\"auto\">an advanced <\/span><a href=\"https:\/\/legal.thomsonreuters.com\/blog\/what-is-risk-management\/\"><span data-contrast=\"none\">risk management<\/span><\/a><span data-contrast=\"auto\"> and <\/span><span data-contrast=\"none\">assessment<\/span><span data-contrast=\"auto\"> process. EDD is commonly required in financial services, particularly when dealing with high-risk customers, large transactions, complex corporate structures, or business activities in countries with weaker regulatory frameworks or higher corruption risks. <\/span><span data-contrast=\"none\">Risk professionals and staff conducting EDD on a potential customer need to cast a wider net for documentation and other information to determine whether the business and its owners are truly who or what they claim to be. <\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">EDD investigation is not once-and-done. Even when the EDD process wraps up and the customer is onboarded, the organization should continue to protect itself by establishing a regular schedule of follow-up monitoring. This monitoring will include reassessment of the customer\u2019s risk profile and identifying potentially <\/span><span data-contrast=\"auto\">suspicious transactions patterns.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">In addition to providing <\/span><span data-contrast=\"auto\">stronger protection <\/span><span data-contrast=\"none\">against financial crimes, incorporating EDD into their risk management protocols also helps organizations:\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<ul>\n<li><span data-contrast=\"none\">Comply with regulatory requirements relating to financial transactions and the prevention of fraud, money laundering, and other crimes<\/span><span data-ccp-props=\"{&quot;134233279&quot;:false,&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"none\">Manage their reputation in the marketplace and with current and potential customers<\/span><span data-ccp-props=\"{&quot;134233279&quot;:false,&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"none\">Mitigate various forms of financial risk\u00a0<\/span><span data-ccp-props=\"{&quot;134233279&quot;:false,&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"none\">Ensure the security of their business relationships with their customers and vendors<\/span><span data-ccp-props=\"{&quot;134233279&quot;:false,&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"none\">Build trust, which can provide a business with a competitive advantage in their industries.\u00a0<\/span><span data-ccp-props=\"{&quot;134233279&quot;:false,&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"auto\">Given the rigor of EDD investigations, <\/span><span data-contrast=\"none\">businesses need to allocate resources of time and funding for their EDD programs to be successful. The amount of resources that an organization allocates will be based on the risk level of the customer and the size and pattern of its transactions. With that in mind, we\u2019ll examine the factors that can classify a customer or a set of transactions as high-risk.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<h2 id=\"heading-2\">Understanding the implications<\/h2>\n<p><span data-contrast=\"none\">When might an organization want to consider instituting EDD? In situations where the potential customer:\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<ul>\n<li><span data-contrast=\"none\">Is located in a high-risk jurisdiction or country. <\/span><a href=\"https:\/\/www.lawsociety.org.uk\/topics\/anti-money-laundering\/high-risk-third-countries-for-aml-purposes\"><span data-contrast=\"none\">Many high-risk countries<\/span><\/a><span data-contrast=\"none\"> are located in Africa and Mideast, though Croatia and Bulgaria also have been identified as such.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"none\">Employs or includes in its ownership structure a politically exposed person (PEP). This category describes <\/span><span data-contrast=\"auto\">individuals who hold or who\u2019ve recently held a prominent public or government position\u2013heads of state, high-ranking government officials or military officers, and leaders of state-owned enterprises.<\/span><span data-ccp-props=\"{&quot;134233279&quot;:false,&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"none\">Operates in a high-risk industry. Examples include investment services, casinos and other gambling, and correspondent banking services such as wire transfers and check clearing. <\/span><\/li>\n<li><span data-contrast=\"none\">Engages in frequent cryptocurrency transactions.<\/span><span data-ccp-props=\"{&quot;134233279&quot;:false,&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"none\">Regularly uses <\/span><span data-contrast=\"auto\">virtual asset service providers (VASPs) to carry out transactions involving different forms of virtual assets or between virtual assets and fiat currencies.\u00a0<\/span><span data-ccp-props=\"{&quot;134233279&quot;:false,&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"none\">Has a complex ownership structure. Such intricacies could be hiding illegal activities and transactions.\u00a0<\/span><span data-ccp-props=\"{&quot;134233279&quot;:false,&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"none\">Frequently transacts huge sums or displays sudden changes in transaction patterns.\u00a0<\/span><span data-ccp-props=\"{&quot;134233279&quot;:false,&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"none\">Has received adverse media coverage, particularly in official reports and in the global financial press. <\/span><span data-contrast=\"auto\">Reports of suspicious or illicit financial activity are very bright red flags.\u00a0<\/span><span data-ccp-props=\"{&quot;134233279&quot;:false,&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"none\">Triggers hits from <\/span><a href=\"https:\/\/legal.thomsonreuters.com\/blog\/sanctions-list-and-kyc-how-to-overcome-the-challenges\/\"><span data-contrast=\"none\">sanctions and watchlists<\/span><\/a><span data-contrast=\"none\">, global databases of individuals and entities forbidden from doing business in certain countries due to their involvement in illegal activities.<\/span><span data-ccp-props=\"{&quot;134233279&quot;:false,&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><a href=\"https:\/\/legal.thomsonreuters.com\/blog\/what-is-identity-verification-an-overview\/\"><span data-contrast=\"none\">Identity verification<\/span><\/a> <span data-contrast=\"none\">of high-risk customers is a chief reason for conducting EDD, but it\u2019s not the only one. EDD can also help organizations remain compliant with regulatory standards. <\/span><span data-contrast=\"auto\">Financial institutions in particular have to conform to industry-specific regulations designed to prevent financial crimes. Because it generates a detailed understanding of high-risk customers, EDD can help reduce an organization\u2019s risk of non-compliance, which can result in costly penalties.\u202fEDD requirements vary by industry and by jurisdiction, but they typically include thorough and accurate documentation of customer data and identification documents and frequent updating.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Establishing EDD procedures also allows organizations to meet the framework of\u00a0 <\/span><a href=\"https:\/\/www.fatf-gafi.org\/en\/publications\/Fatfrecommendations\/Fatf-recommendations.html\"><span data-contrast=\"none\">recommendations<\/span><\/a><span data-contrast=\"none\"> established and regularly updated by the <\/span><span data-contrast=\"none\">Financial Action Task Force<\/span><span data-contrast=\"none\">(FATF), an international standard-setting body dedicated to combating money laundering and terrorist financing.\u202f<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<table>\n<tbody>\n<tr>\n<td><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone wp-image-11314 not-transparent\" src=\"https:\/\/legal.thomsonreuters.com\/blog\/wp-content\/uploads\/sites\/19\/2024\/07\/TR_Waypt_Wide_Rectangle_12-1-scaled-webp.webp\" alt=\"\" width=\"889\" height=\"500\" data-dominant-color=\"123222\" data-has-transparency=\"false\" \/><\/td>\n<td>\n<article class=\"banner\">\n<div class=\"banner-item\">\n<section class=\"banner__footer\">\n<p class=\"banner__meta\"><b>Due diligence: An overview<br \/>\n<\/b>Definition, common examples in various sectors, and how-to resources<\/p>\n<p>&nbsp;<\/p>\n<p class=\"banner__meta\"><a href=\"https:\/\/legal.thomsonreuters.com\/blog\/due-diligence\/\">Read overview \u2197<\/a><\/p>\n<\/section>\n<\/div>\n<\/article>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<h2 id=\"heading-3\">The process of enhanced due diligence<\/h2>\n<p><span data-contrast=\"none\">The EDD process begins with a checklist. Here is a representative example, one that organizations can tailor based on their specific requirements, resources, risks, and customer bases:\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<h3>1. Initial risk assessment<\/h3>\n<p><span data-contrast=\"none\">The organization starts by determining whether the customer should be categorized as high-risk based on the attributes discussed earlier with a <a href=\"https:\/\/legal.thomsonreuters.com\/blog\/what-is-a-risk-assessment\/\">risk assessment<\/a>. This preliminary screening typically includes initial identification of any potential red flags. <\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<h3>2. Identity verification<\/h3>\n<p><span data-contrast=\"none\">The organization then gathers all the information it can to authenticate a high-risk customer\u2019s identity. The business should also undertake an analysis of the potential customer\u2019s corporate structure and identify its <\/span><a href=\"https:\/\/legal.thomsonreuters.com\/blog\/beneficial-ownership-information-boi-an-overview\/\"><span data-contrast=\"none\">beneficial ownership<\/span><\/a><span data-contrast=\"none\">\u2014that is, the individuals who control and\/or own a substantial part of the prospective customer.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<h3>3. Background investigation<\/h3>\n<p><span data-contrast=\"auto\">To ensure that its EDD background research is complete and accurate, organizations need to access several databases and other information sources. These include:<\/span><\/p>\n<ul>\n<li><span data-contrast=\"none\">Criminal records and other public records<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"none\">Sanctions and watchlists<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li><a href=\"https:\/\/legal.thomsonreuters.com\/blog\/overview-adverse-media-screening\/\"><span data-contrast=\"none\">Adverse media searches<\/span><\/a><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"none\">Determining whether an owner or owners of a high-risk business is a politically exposed person (PEP).\u00a0<\/span><\/li>\n<\/ul>\n<h3>4. Financial assessment <span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"none\">In assessing the customer\u2019s financial wherewithal, the organization will want to verify its <\/span><span data-contrast=\"none\">beneficial ownership<\/span><span data-contrast=\"none\"> to determine the control of its financial assets. The assessment also will include verifying the value of the customer\u2019s real assets (usually defined as physical property) and intangible assets (the customer\u2019s sources of earnings).\u202fIn addition, it should examine the customer transaction history, looking closely not only at the size and frequency of transactions but also at the entities that the customer has done business with.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<h3>5. Ongoing monitoring<\/h3>\n<p><span data-contrast=\"none\">As we noted earlier, the organization should perform regular monitoring of high-risk customers and their transactions to detect any significant changes or irregularities. This ongoing review process also incorporates regular review of any media coverage of these customers.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<h2 id=\"heading-4\">Best practices for enhanced due diligence<\/h2>\n<p><span data-contrast=\"none\">An effective EDD program requires its risk assessment and risk mitigation teams to familiarize themselves with EDD best practices. These include:\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<ul>\n<li><span data-contrast=\"none\">Creating and maintaining thorough documentation of all interactions with and investigations of potential customers deemed high-risk<\/span><span data-ccp-props=\"{&quot;134233279&quot;:false,&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"none\">Developing staff training programs covering all aspects of EDD, including regulatory requirements and best practices<\/span><span data-ccp-props=\"{&quot;134233279&quot;:false,&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"none\">Prioritizing monitoring resources based on customers\u2019 risk levels<\/span><span data-ccp-props=\"{&quot;134233279&quot;:false,&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"none\">Establishing rigorous data security measures to protect both the organization and its customers (high-risk or otherwise)<\/span><span data-ccp-props=\"{&quot;134233279&quot;:false,&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"none\">Putting in place clear EDD policies and procedures, conducting regular audits to ensure that these policies are up to date and compliant with all pertinent regulations.<\/span><span data-ccp-props=\"{&quot;134233279&quot;:false,&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"none\">Enhanced due diligence provides businesses of all kinds\u2014not only financial services firms\u2014with a powerful defense against fraud and other illicit financial activities. By helping prevent global criminal activity and cutting off funding to terrorists, it\u2019s not too much to say that EDD helps protect <\/span><i><span data-contrast=\"none\">all of us<\/span><\/i><span data-contrast=\"none\">.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">That\u2019s why it\u2019s essential that organizations do EDD right. They should make certain that they\u2019re devoting sufficient time and money to performing thorough verification and monitoring of current and potential high-risk customers. All this requires investigative technology solutions that can access accurate, thorough information and automate crucial aspects of the risk monitoring process.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Thomson Reuters Risk and Fraud Solutions has developed a solution to <a href=\"https:\/\/legal.thomsonreuters.com\/en\/c\/clear\/enhanced-due-diligence\">strengthen an organization\u2019s EDD processes<\/a>. Though these solutions have been crafted primarily for financial services firms and institutions, they can be used by any organization whose business may interface with high-risk customers and transactions. Gain customer insights and prioritize resources based on actual threats to maximize investigator effectiveness and minimize wasted effort.<br \/>\n<\/span><\/p>\n<table>\n<tbody>\n<tr>\n<td><img decoding=\"async\" class=\"alignnone wp-image-9205 not-transparent lazyloaded\" src=\"https:\/\/legal.thomsonreuters.com\/blog\/wp-content\/uploads\/sites\/19\/2024\/07\/216408_220828902-new-jpg.webp\" alt=\"woman working at a laptop\" width=\"825\" height=\"500\" data-dominant-color=\"7b8587\" data-has-transparency=\"false\" data-src=\"https:\/\/legal.thomsonreuters.com\/blog\/wp-content\/uploads\/sites\/19\/2024\/07\/216408_220828902-new-jpg.webp\" \/><\/td>\n<td>\n<article class=\"banner\">\n<div class=\"banner-item\">\n<section class=\"banner__footer\">\n<p class=\"banner__meta\"><b>CLEAR for enhanced due diligence<br \/>\n<\/b>Investigate suspicious activity quickly and thoroughly<\/p>\n<p>&nbsp;<\/p>\n<p class=\"banner__meta\"><a href=\"https:\/\/legal.thomsonreuters.com\/en\/c\/clear\/enhanced-due-diligence\">Request free demo \u2197<\/a><\/p>\n<\/section>\n<\/div>\n<\/article>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<hr \/>\n<p><em>Thomson Reuters is not a consumer reporting agency and none of its services or the data contained therein constitute a \u2018consumer report\u2019 as such term is defined in the Federal Fair Credit Reporting Act (FCRA), 15 U.S.C. sec. 1681 et seq. The data provided to you may not be used as a factor in consumer debt collection decisioning, establishing a consumer\u2019s eligibility for credit, insurance, employment, government benefits, or housing, or for any other purpose authorized under the FCRA. By accessing one of our services, you agree not to use the service or data for any purpose authorized under the FCRA or in relation to taking an adverse action relating to a consumer application.<\/em><\/p>\n<p>[\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column][vc_column_text css=&#8221;&#8221;] Enhanced due diligence (EDD): An overview &nbsp; These should be worrying statistics for risk professionals charged with maintaining the financial well-being and the reputational integrity of their organizations. Financial services firms need to be particularly vigilant, since they\u2019re required to comply with anti-money laundering (AML) and know-your-customer (KYC) regulations established to crack down<\/p>\n","protected":false},"author":1,"featured_media":3306,"comment_status":"open","ping_status":"open","sticky":true,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[153,152],"tags":[],"class_list":["post-756","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-financial-crime-aml","category-governance-risk-esg","sticky"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/grcfincrimetoday.org\/index.php\/wp-json\/wp\/v2\/posts\/756","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/grcfincrimetoday.org\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/grcfincrimetoday.org\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/grcfincrimetoday.org\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/grcfincrimetoday.org\/index.php\/wp-json\/wp\/v2\/comments?post=756"}],"version-history":[{"count":4,"href":"https:\/\/grcfincrimetoday.org\/index.php\/wp-json\/wp\/v2\/posts\/756\/revisions"}],"predecessor-version":[{"id":3308,"href":"https:\/\/grcfincrimetoday.org\/index.php\/wp-json\/wp\/v2\/posts\/756\/revisions\/3308"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/grcfincrimetoday.org\/index.php\/wp-json\/wp\/v2\/media\/3306"}],"wp:attachment":[{"href":"https:\/\/grcfincrimetoday.org\/index.php\/wp-json\/wp\/v2\/media?parent=756"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/grcfincrimetoday.org\/index.php\/wp-json\/wp\/v2\/categories?post=756"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/grcfincrimetoday.org\/index.php\/wp-json\/wp\/v2\/tags?post=756"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}