1 About Transaction Monitoring

Oracle Financial Services Crime and Compliance Management Transaction Monitoring Cloud Service (FCCM TM Cloud Service) enables financial institutions to efficiently detect and investigate suspected money laundering activity to comply with current and future regulations and guidelines. It provides automated and consistent surveillance of accounts, customers, and third parties in transactions across all business lines. The application enables organizations to monitor customer transactions, using customer historical information and account profiles to provide a holistic view of transactions and activities. The scenarios are optimized for smaller financial institutions to detect, investigate, and report suspected money laundering and terrorist financing activities with simple configuration and operational control.

Key Features

The key features of the application include the following:

  • Risk-based monitoring and investigations of suspicious activities that specifically target smaller financial institutions.
  • In-built scenario library to detect the most common anti-money laundering scenarios.
  • Ready to run data pipelines to prepare and optimize data for behavior detection, which includes an extensive library of data quality rule checks.
  • Ability to create and tailor data and scenario pipelines to meet customer requirements.
  • Ability to configure thresholds to provide optimum configuration.
  • Ability to tune scenario parameters to provide optimum configuration.
  • Robust in-built case management streamlines analysis and resolution in a single unified platform.
  • Ability to generate operational reports of cases enhances data visualization and analyses. The ability to run reports is role-based, and users can generate reports and view them in tabular and graphical formats.
  • Process Modeling Framework which facilitates built-in tooling for orchestration of human and automatic workflow interfaces. This enables Administrators to model business processes and create configurable workflows.

User Roles and Privileges

You can perform activities associated with your user group throughout the functional areas in the application. For more information about which actions can be performed by your user role, see User Roles and Privileges.

Security within the Application

Security layers control how you interact with the application. Users may only access cases that are mapped to their user group. For more information about mapping users to user groups, see Provision Users..

Table 1-1 Security Details within the Application

Security Layer Type Controls Description
Roles Access to Features and Functions This security layer identifies features and functions the user can access within the application. For example, Case Analysts can access and take action on cases.
Business Domains Access to Case and Business Information You can restrict access along operational business lines and practices, such as Retail Banking. Users can only see cases that are assigned to at least one of the business domains their user group is mapped to.

For more information about Business Domains, see Business Domains,.

Jurisdictions Access to Case Information You can restrict access using geographic locations or legal boundaries. Users can only see cases that belong to the jurisdiction their user group is mapped to.

For more information about Jurisdictions, see Jurisdictions.