3.1.4 Managing Data

This section explains different methods used to load and process data. Figure 7 shows the sequence for data loading:

Figure 3-5 Data Loading For AML/Fraud/KYC/FATCA/CTR Applications


Data Loading For AML/Fraud/KYC/FATCA/CTR Applications

The following table provides the steps required to load data for Behavior Detection Applications, including CTR.

Application Steps Group

AML

Fraud KYC FATCA CTR

  1. Execute Group 1 through Group 5 in sequence in the CSA using AAI T2T/H2T.
  2. Process the loaded data using BD datamaps in FSDM.
  3. Interface files in the same group loaded through different loading method can be executed in parallel.
  4. Run AML BD transformation.
  5. For network scenarios, refresh the temporary tables.

Group1

Group2

Group3

Group4

Group5