Advanced Search

The Central Regulation Of The Reporting And Analysis Of Financial Transactions Number Per-14/1.02.1/ppatk/10/2011 In 2011

Original Language Title: Peraturan Pusat Pelaporan dan Analisis Transaksi Keuangan Nomor PER-14/1.02.1/PPATK/10/2011 Tahun 2011

Subscribe to a Global-Regulation Premium Membership Today!

Key Benefits:

Subscribe Now for only USD$40 per month.
ples of the Service User;

d. ensuring that special work units carry out the policy and procedure of the Principles Recognize the Service Users apart from the work unit that oversees its application;

e. ensuring that each office network has an employee who runs a portion of the function of a special work unit or an official performing the Principles of Recognizing the Service User;

f. ensuring that all employees, in particular the employees of the associated work unit and new employees, have followed the trainings relating to the Principles of Recognizing the Service Users periodically.

Article 4

Board of commissioners or supervisors board Pergadaian must carry out active surveillance with:

a. agree to the policies and procedures of the application of the Principles Regarding the User of Merit;

b. ensuring the execution of tasks and responsibilities of directors or administrators for the application of the Principles of Service Users.

Section 5

(1) The paragraph is required to form a special work unit and/or appoint an official in charge of the charge. address the application of the Services User.

(2) The special work unit and/or the official as referred to in the paragraph (1) is directly responsible to the board of directors or administrators.

(3) the Board of Directors or administrators ensure that the unit is responsible. special work and/or officials as referred to the paragraph (1) has the authority to access the entire transaction data of the Services and other relevant information.

Section 6

Special working unit or responsible official in the application of the Principles of Recognizour Service Users is mandatory:

www.djpp.depkumham.go.id

2011, No. 920 6

a. Monitor the performance of the Service User's profile and the Service User's Transaction Profile;

b. conduct coordination and monitoring of the implementation of the Principles of the Principles of Service User with related work units related to the Service User;

c. analyze suspicious, suspicious report of Financial Transactions (red flag) received from the related work unit;

d. Compiling a TKM and TKT reports as set out in the Invite-Invite to be delivered to the PPATK based on the approval of the board or administrator;

e. monitor, analyze, and recommend the principle of training the Principles of Service Users for the Pergadaian employees.

BAB III

POLICIES AND PROCEDURES

The Kesatu

General

Section 7

The obligatory Pergadaian Pouring out policies and procedures of Principles Identifying the User in the Guiding Principle of the Service User.

Article 8

(1) In implementing the Principles of Recognizing the User, Pergadaian is required to have policies and procedures written related to execution:

a. information request and Document;

b. Beneficial Owner;

c. verify Document;

d. customer due diligence is simpler;

e. enhance due diligence;

f. Transaction monitoring and data processing;

g. attempt to disconnect;

h. Document handler.

(2) In terms of customer due diligence is implemented by a third party, it is required to be poured in the policy and the written procedure of the Principles of the Service User.

www.djpp.depkumham.go.id

2011, No. 9207

(3) The drafting and change of written policies and procedures as referred to in paragraph (1) and paragraph (2) are required to consider the information technology factors that are potentially misused by the Money Laundering. Terrorism Funding.

(4) Pergadaian is required to implement written policies and procedures as referred to in paragraph (1) and paragraph (2) consistent and continuous.

Article 9

(1) Pergadaian is required to classify the User Services.

(2) The clustering as referred to in paragraph (1) is based on:

a. analysis of the severity of the risk of a Money Laundering or Terrorism Financing; and

b. Service User type.

Section 10

(1) The Service User clustering is based on analysis of the severity of the Penlaundering Money and the funding of terrorism as referred to in Article 9 of the paragraph (2) of the letter a includes:

a. Services User's identity;

b. Service User Value:

c. User profile of the Services;

d. Transaction number:

. Service User business activities;

f. Service User's revenue;

g. the ownership structure of the company that uses the Pergadaian service; and

h. other information that may be used to measure the level of Service User's risk.

(2) Based on the results of the clustering as referred to in paragraph (1), Pergadaian performs the Service User group which is:

a. low risk;

b. Middle-risk; and

c. High risk.

Article 11

The Pergadaian is required to perform Principles of Service Users against existing customers if:

www.djpp.depkumham.go.id

2011, No. 920 8

a. There is an increase in the value of the Cloud Service;

. There is a significant change in the profile of the Service User;

c. information on the Service User profile available in the information system has not been equipped with the data and information listed in the supporting Document and/or yet There are support documents, and/or

d. known and/or should be suspected of using the False Document.

section 12

The grouping of the Service User based on the type of Service User as referred to in Article 9 of the paragraph (2) of the letter b is performed by identifying and classifying Users of the Services into individual groups or Corporations.

Second Part

Request Information and Documents

Paragraph 1

General

Section 13

(1) The service is required to request information and documents to the User. Services.

(2) Before performing a request for information and Documents as Referred to in paragraph (1), the Pergadaian must ensure the Service User acts for itself or represents the Beneficial Owner in a business relationship.

Article 14

(1) The person is required to request information to the Service User. the least includes:

a. Services User's identity;

b. The purpose of the purpose of the Services is to be made;

c. User's financial profile of the Service;

d. the origin of the Warranty Service or source of the funds;

e. other information that allows Pergadaian to be able to find out the Service Users include the previously owned business relationship with Pergadaian; and

f. the identity of the recipient who acts t.

(4) The Principles of the Service User are part of the application of the overall Pergadaian risk management.

BAB II

SUPERVISION ACTIVE DIRECTORS OR ADMINISTRATORS

AND BOARD OF COMMISSIONERS OR SUPERVISORS

Section 3

The Board of Directors or Pergadaian administrators must carry out active surveillance with:

www.djpp.depkumham.go.id

2011, No. 9205

a. establish the policy and procedure written Principles of Service Users under the approval of the board of the commissioner or the supervising board;

b. ensuring the implementation of the Principles of Service Users is executed in accordance with established written policies and procedures;

c. ensure the creation of a special work unit and/or appoint the officer responsible for The application of the Princi Owner which meet high-risk criteria made in its own list.

Section 20

(1) In the event of Pergadaian will do a Transaction User or Beneficial Owner of a high risk, then it is required to appoint officials in charge of the transaction with the User of the Services.

(2) Officials as referred to in paragraph (1) are authorized to:

a. provide approval or rejection of a high-risk IBM SaaS User or Beneficial Owner ; and

b. Decide to continue or stop the Transaction with a Service User or Beneficial Owner at a high risk.

Sixth Part

Implementation of Customer Due Diligence By Third Parties

Article 21

(1) Pergadaian may use Customer Due Diligence which the Third Party has made against its prospective services Users on that Third Party.

(2) The results of Customer Due Diligence as referred to the paragraph (1) may be used by Pergadaian if the Third Party:

A. have a Customer Due Diligence procedure in accordance with the applicable provisions;

b. have a cooperation with Pergadaian in the form of a written agreement;

c. subject to the supervision of the authorized authority in accordance with the applicable provisions;

d. Willing to comply with the terms of this Agreement, the terms of this Agreement will be provided to you in the IBM International Agreement for the IBM SaaS. It is in the country that has applied the FATF Recommendation.

(3) The Pergadaian must perform Customer Due Diligence and verification of the results of Customer Due Diligence that the Third Party has done.

www.djpp.depkumham.go.id

2011, No. 920 14

(4) Pergadaians using the Customer Due Diligence result of the Third Party as referred to in paragraph (1) are responsible for executing the document and document storage.

Part Seventh

Transaction Monitoring and Service User Data Management

Section 22

(1) Pergadaian must be continuous monitoring of the Transaction User's Transaction.

(2) The Monitoring as referred to in the paragraph (1) performed to ensure the suitability between the Transaction User's Transaction Identity, business, risk profile, origin of the Warranty Service, or Service User's resources.

Section 23

(1) Pergadaian is required to conduct analysis of the Transaction in a large nominal, unsuitable pattern of Transactions, not appropriate to the profile, characteristic, and transaction of a Service User's Transaction, or have no clear economic reason and no valid purpose.

(2) Pergadaian may request information about the background and purpose of the Transaction against the Transaction. does not match the profile, characteristic, and custom of the Service User's pattern of transactions, with regard to the anti-tipping-off provision as set out in the Act.

Section 24

Pergadaian is required to perform data processing of the information and documents of the entire Service User or Beneficial Owner.

Section 25

(1) Pergadaian is required to maintain a database of terrorist lists based on data published by the government or international organizations.

(2) Pergadaian is mandatory to ensure periodically the names of the Service Users The pergadaian has similarities or similarities to the names listed in the terrorist list database.

(3) In terms of the similarity of the name of the Service User with the names listed in the database of the terrorist list, the Pergadaian is obliged to ensure fitness of the Services User identity.

(4) In the case of the user name similarity Services and other similarity of information with names listed in the list database

www.djpp.depkumham.go.id

2011, No. 92015

terrorists, Pergadaian is required to report the User of the Services as TKM.

Section Eighth

Document Viewer

Article 26

(1) The mandatory Pergadaian makes up the entire Service User and the Beneficial Owner in at least 5 (five) years since the end of the relationship efforts with the Service User or the discovery of a Transaction Document with the purpose of a Transaction.

(2) The document as referred to in paragraph (1) at least includes the identity of the Service User or Beneficial Owner and the relationship form efforts include a correspondence Document with a Service User.

Part Ninth

Determination of Effort

Article 27

(1) Pergadaian is required to disconnect the business relationship with the Service User if:

a. The Service User refuses to comply with the Principles of Service Users; or

b. Pergadaian doubts the truth of the information delivered by the Service User.

(2) Pergadaian shall document the Users of the Services that meet the criteria as referred to in paragraph (1).

(3) In the event of a termination action of the relationship relationship as referred to in paragraph (1), Pergadaian is required to report to PPATK as TKM.

Section 28

In the event of a termination of the business relationship as referred to in Section 27 paragraph (1) is conducted against Existing Customer, Pergadaian remains in control of or does not move the Warranty Goods if there is a request from authority.

BAB IV

INTERN CONTROL

Article 29

(1) The mandatory internal control system has an effective internal control system in the application of the Principles of the Service User.

www.djpp.depkumham.go.id

2011, No. 920 16

(2) The execution of an internal control system as referred to in paragraph (1) is evidenced by:

a. the limitations of the authority and the responsibilities of the work unit relating to the application of the Principles Know the User of the Service;

b. Performed a check on a work unit or an official who is appointed to know the effectiveness of the Principles of Identifying The Service User and the execution of a reporting obligation by an internal audit work unit.

BAB V

INFORMATION SYSTEMS AND REPORTING

Section 30

(1) Pergadaian must have an information system that can identify, analyze, monitor, and provide an effective report on the characteristics of a Transaction that is committed by the Service User.

(2) The System information as referred to in paragraph (1) may be performed manually or with a computerized system.

BAB VI

HUMAN RESOURCES AND TRAINING

Section 31

The obligatory Pergadaian has a human resource that has a sufficient amount of competence in the application of the Pergadaian The Principle Recognizes The Service User.

Section 32

(1) Pergadaian is mandatory for regular training and socialization to the related employees regarding:

a. implementation of the laws related to the prevention and eradication of Money Laundering and Terrorism Financing;

b. information on engineering, methods, and trends of the latest Money Laundering and Terrorism Financing;

c. The policy and procedure of the application of Principles Recorrorism.

(3) The Application enhance due diligence is done by monitoring periodically and analysing the Service User's profile information or Beneficial

www.djpp.depkumham.go.id

2011, No. 92013

Owner, the origin of Warranty Goods, the source of the funds used for the softening of the Warranty Service, the purpose of the Transaction, and the business relationship with the related parties.

(4) Merit Users or Beneficial