[PDF] Anti-money laundering and counter-terrorist financing measures





Previous PDF Next PDF



Information Exchanges Between Competitors under Competition

11 juil. 2011 to plan on producing the following year and the like. ... exchange of commercially sensitive information places unaffiliated competitors at ...



Widening the Gap: Pre-University Gap Years and the Economy of

Embarking upon a pre-university gap year is an increasingly popular option particularly problematic for those sections of the middle classes who have d.



Common European Framework of Reference for Languages

tive European system of information exchange covering all aspects of language learning teaching and research



Report on the role of public arts and cultural institutions in the

In Europe the European Commission's decision to make 2008 the Year of Intercul- is to create common goods



Transparency and Exchange of Information for Tax Purposes

Ten years on the Global Forum has nearly. 160 member jurisdictions and has achieved massive progress in implementing the international tax transparency and 



Anti-money laundering and counter-terrorist financing measures

1 avr. 2019 Around 60 people each year from China have participated as ... i) China should pay more attention to the exchange of information in ML/TF.



Trends in Income Inequality and its Impact on Economic Growth

In most OECD countries the gap between rich and poor is at its highest level since 30 years. Today



B1 Preliminary for Schools Handbook

31 mars 2021 ? They should look at each numbered space in turn and select one of the sentences A–H to fit the gap. ? Candidates need to check that the ...



REPORT: State of the Worlds Girls: The Truth Gap

driven from online spaces. Four years of research has illustrated just how far there is to go before girls and young women in all their.



Caractérisation de panneaux solaires photovoltaïques en conditions

17 juin 2015 Solar irradiance variability since Space Science Reviews (1-4)

What is the gap between Exchange and completion?

The gap between Exchange and Completion can be anything the parties agree, from same day to........ 10 years or more. Whilst 2 - 4 weeks is normal, longer time periods are common. So the question is, what do you mean by 'delayed'? 2 months? 6? A year? More? Obviously the longer this period, the harder to find a buyer who will agree.

What is a gap year in France?

Originating in the 1980s, the “gap year” has long been shunned outside English-speaking countries. But in recent years, the gap year system has been used more and more by students in France who wish to take a break from their studies to spend a year abroad or build up professional experience for their CV. What is a gap year?

What will be the effect of a gap period for abroad studies?

For many students, the question ‘what will be the effect of a gap period for abroad studies’ never arises. But there are quite a few who would need this crucial question answered. The major concern for them is ‘do I stand a chance of being admitted to XYZ school because I have a gap in my studies?

April 2019

Anti-money laundering and counter-terrorist ?nancing measures China Anti-money laundering and counter-terrorist financing measures

People's Republic

of China

Mutual Evaluation Report

2019
The Financial Action Task Force (FATF) is an independent inter-governmental body that develops and

promotes policies to protect the global financial system against money laundering, terrorist financing

and the financing of proliferation of weapons of mass destruction. The FATF Recommendations are recognised as the global anti-money laundering (AML) and counter-terrorist financing (CTF) standard. For more information about the FATF, please visit the website: www.fatf-gafi.org. This document and/or any map included herein are without prejudice to the status of or sovereignty over any territory, to the delimitation of international frontiers and boundaries and to the name of any territory, city or area. This assessment was led by staff of the International Monetary Fund, and adopted by the FATF at its February 2019 Plenary meeting.

Citing reference:

© 2019 FATF-. All rights reserved.

No reproduction or translation of this publication may be made without prior written permission. Applications for such permission, for all or part of this publication, should be made to the FATF Secretariat, 2 rue André Pascal 75775 Paris Cedex 16, France (fax: +33 1 44 30 61 37 or e-mail: contact@fatf-gafi.org).

Photo Credit

- Cover: © Getty Images FATF (2019), Anti-money laundering and counter-terrorist financing measures - People's Republic of China, Fourth Round Mutual Evaluation Report, FATF, Paris

Ň 1

$QPLPRQH\ OMXQGHULQJ MQG ŃRXQPHUPHUURULVP ILQMQŃLQJ PHMVXUHV LQ FOLQM 201E ‹ )$7) $3* MQG ($* 201E Table of Contents

.H\ )LQGLQJV BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB D

5LVNV MQG *HQHUMO 6LPXMPLRQ BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB 6

2YHUMOO IHYHO RI (IIHŃPLYHQHVV MQG 7HŃOQLŃMO FRPSOLMQŃH BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB 7

3ULRULP\ $ŃPLRQV BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB 14

(IIHŃPLYHQHVV MQG 7HŃOQLŃMO FRPSOLMQŃH 5MPLQJV BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB 16

MUTUAL EVALUATION REPORT ................................................................................................ 19

3UHIMŃH BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB 1E

CHAPTER 1. ML/TF RISKS AND CONTEXT .............................................................................. 21

0IC7) 5LVNV MQG 6ŃRSLQJ RI +LJOHU5LVN HVVXHV BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB 22

0MPHULMOLP\BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB 27

6PUXŃPXUMO (OHPHQPV BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB 28

%MŃNJURXQG MQG 2POHU FRQPH[PXMO )MŃPRUV BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB 28

CHAPTER 2. NATIONAL AML/CFT POLICIES AND CO-ORDINATION ............................. 41

.H\ )LQGLQJV MQG 5HŃRPPHQGHG $ŃPLRQV BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB 41

HPPHGLMPH 2XPŃRPH 1 5LVN 3ROLŃ\ MQG FRRUGLQMPLRQ BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB 42

CHAPTER 3. LEGAL SYSTEM AND OPERATIONAL ISSUES ................................................ 49

.H\ )LQGLQJV MQG 5HŃRPPHQGHG $ŃPLRQV BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB 4E

HPPHGLMPH 2XPŃRPH 6 )LQMQŃLMO HQPHOOLJHQŃH 0IC7) BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB D2

HPPHGLMPH 2XPŃRPH 7 0I HQYHVPLJMPLRQ MQG 3URVHŃXPLRQ BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB 6E

HPPHGLMPH 2XPŃRPH 8 FRQILVŃMPLRQ BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB 7E

CHAPTER 4. TERRORIST FINANCING AND FINANCING OF PROLIFERATION ............ 89

.H\ )LQGLQJV MQG 5HŃRPPHQGHG $ŃPLRQV BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB 8E

HPPHGLMPH 2XPŃRPH E 7) HQYHVPLJMPLRQ MQG 3URVHŃXPLRQ BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB E2

HPPHGLMPH 2XPŃRPH 10 7) 3UHYHQPLYH 0HMVXUHV MQG )LQMQŃLMO 6MQŃPLRQV BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB 100

HPPHGLMPH 2XPŃRPH 11 3) )LQMQŃLMO 6MQŃPLRQV BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB 107

CHAPTER 5. PREVENTIVE MEASURES ................................................................................... 113

2 Ň

.H\ )LQGLQJV MQG 5HŃRPPHQGHG $ŃPLRQV BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB 113

HPPHGLMPH 2XPŃRPH 4 3UHYHQPLYH 0HMVXUHV BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB 114

CHAPTER 6. SUPERVISION ......................................................................................................... 131

.H\ )LQGLQJV MQG 5HŃRPPHQGHG $ŃPLRQV BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB 131

HPPHGLMPH 2XPŃRPH 3 6XSHUYLVLRQ BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB 133

CHAPTER 7. LEGAL PERSONS AND ARRANGEMENTS ...................................................... 155

.H\ )LQGLQJV MQG 5HŃRPPHQGHG $ŃPLRQV BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB 1DD

HPPHGLMPH 2XPŃRPH D IHJMO 3HUVRQV MQG $UUMQJHPHQPV BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB 1D6

CHAPTER 8. INTERNATIONAL CO-OPERATION .................................................................. 165

.H\ )LQGLQJV MQG 5HŃRPPHQGHG $ŃPLRQV BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB 16D

HPPHGLMPH 2XPŃRPH 2 HQPHUQMPLRQMO FRRSHUMPLRQBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB 166

TECHNICAL COMPLIANCE ANNEX .......................................................................................... 181

5HŃRPPHQGMPLRQ 1²$VVHVVLQJ 5LVNV MQG $SSO\LQJ M 5LVN%MVHG $SSURMŃO BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB 181

5HŃRPPHQGMPLRQ 2²1MPLRQMO FRRSHUMPLRQ MQG FRRUGLQMPLRQ BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB 184

5HŃRPPHQGMPLRQ 3²0RQH\ IMXQGHULQJ 2IIHQŃH BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB 18D

5HŃRPPHQGMPLRQ 4²FRQILVŃMPLRQ MQG 3URYLVLRQMO 0HMVXUHV BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB 188

5HŃRPPHQGMPLRQ D 7HUURULVP )LQMQŃLQJ 2IIHQŃH BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB 1E0

5HŃRPPHQGMPLRQ 6 7MUJHPHG )LQMQŃLMO 6MQŃPLRQV 5HOMPHG PR 7HUURULVP MQG 7HUURULVP )LQMQŃLQJ 1E2

5HŃRPPHQGMPLRQ 7 7MUJHPHG )LQMQŃLMO 6MQŃPLRQV 5HOMPHG PR 3UROLIHUMPLRQ BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB 1ED

5HŃRPPHQGMPLRQ 8²1RQ3URILP 2UJMQLVMPLRQV BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB 1E7

5HŃRPPHQGMPLRQ E²)LQMQŃLMO HQVPLPXPLRQ 6HŃUHŃ\ IMRV BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB 200

5HŃRPPHQGMPLRQ 10²FXVPRPHU GXH GLOLJHQŃHBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB 201

5HŃRPPHQGMPLRQ 11 5HŃRUGNHHSLQJ BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB 208

5HŃRPPHQGMPLRQ 12 3ROLPLŃMOO\ ([SRVHG 3HUVRQV BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB 20E

5HŃRPPHQGMPLRQ 13 FRUUHVSRQGHQP %MQNLQJ BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB 210

5HŃRPPHQGMPLRQ 14 0RQH\ RU 9MOXH 7UMQVIHU 6HUYLŃHV BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB 212

5HŃRPPHQGMPLRQ 1D 1HR 7HŃOQRORJLHV BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB 213

5HŃRPPHQGMPLRQ 16 JLUH 7UMQVIHUV BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB 213

5HŃRPPHQGMPLRQ 17²5HOLMQŃH RQ 7OLUG 3MUPLHV BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB 217

5HŃRPPHQGMPLRQ 18²HQPHUQMO FRQPUROV MQG )RUHLJQ %UMQŃOHV MQG 6XNVLGLMULHV BBBBBBBBBBBBBBBBBBBBBBBBBBB 217

5HŃRPPHQGMPLRQ 1E +LJOHU5LVN FRXQPULHV BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB 21E

5HŃRPPHQGMPLRQ 20 5HSRUPLQJ RI 6XVSLŃLRXV 7UMQVMŃPLRQV BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB 220

5HŃRPPHQGMPLRQ 21 7LSSLQJRII MQG FRQILGHQPLMOLP\ BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB 222

Ň 3

$QPLPRQH\ OMXQGHULQJ MQG ŃRXQPHUPHUURULVP ILQMQŃLQJ PHMVXUHV LQ FOLQM 201E ‹ )$7) $3* MQG ($* 201E 5HŃRPPHQGMPLRQ 22 G1)%3V FXVPRPHU GXH GLOLJHQŃH BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB 222

5HŃRPPHQGMPLRQ 23 G1)%3V 2POHU 0HMVXUHV BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB 226

5HŃRPPHQGMPLRQ 24 7UMQVSMUHQŃ\ MQG %HQHILŃLMO 2RQHUVOLS RI IHJMO 3HUVRQV BBBBBBBBBBBBBBBBBBBBBBBBBB 227

5HŃRPPHQGMPLRQ 2D 7UMQVSMUHQŃ\ MQG %HQHILŃLMO 2RQHUVOLS RI IHJMO $UUMQJHPHQPVBBBBBBBBBBBBBBBB 230

5HŃRPPHQGMPLRQ 26²5HJXOMPLRQ MQG 6XSHUYLVLRQ RI )LQMQŃLMO HQVPLPXPLRQV BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB 231

5HŃRPPHQGMPLRQ 27 3RRHUV RI 6XSHUYLVRUV BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB 237

5HŃRPPHQGMPLRQ 28 5HJXOMPLRQ MQG 6XSHUYLVLRQ RI G1)%3V BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB 238

5HŃRPPHQGMPLRQ 2E )LQMQŃLMO HQPHOOLJHQŃH 8QLPVBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB 240

5HŃRPPHQGMPLRQ 30 5HVSRQVLNLOLPLHV RI IMR (QIRUŃHPHQP MQG HQYHVPLJMPLYH $XPORULPLHV BBBBBBBBBBB 24D

5HŃRPPHQGMPLRQ 31 3RRHUV RI IMR (QIRUŃHPHQP MQG HQYHVPLJMPLYH $XPORULPLHV BBBBBBBBBBBBBBBBBBBBBBBBB 246

5HŃRPPHQGMPLRQ 32 FMVO FRXULHUV BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB 247

5HŃRPPHQGMPLRQ 33 6PMPLVPLŃV BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB 2D0

5HŃRPPHQGMPLRQ 34 *XLGMQŃH MQG )HHGNMŃNBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB 2D1

5HŃRPPHQGMPLRQ 3D 6MQŃPLRQV BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB 2D2

5HŃRPPHQGMPLRQ 36 HQPHUQMPLRQMO HQVPUXPHQPV BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB 2D6

5HŃRPPHQGMPLRQ 37 0XPXMO IHJMO $VVLVPMQŃH BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB 2D6

5HŃRPPHQGMPLRQ 38 0XPXMO IHJMO $VVLVPMQŃH )UHH]LQJ MQG FRQILVŃMPLRQ BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB 2D8

5HŃRPPHQGMPLRQ 3E ([PUMGLPLRQ BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB 260

5HŃRPPHQGMPLRQ 40 2POHU )RUPV RI HQPHUQMPLRQMO FRRSHUMPLRQ BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB 261

6XPPMU\ RI 7HŃOQLŃMO FRPSOLMQŃH ± .H\ GHILŃLHQŃLHV BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB 267

Glossary of Acronyms ........................................................................................................................ 275

Executive Summary 1. This report provi des a summary of the anti-money laund ering/combating the

financing of terrorism (AML/CFT) measures in place in -Š‡ 0‡‘"Ž‡ǯ• 2‡"—"Ž‹... ‘ˆ China

(China)1 as at the date of the onsite visit (July 9Ȃ27, 2018). It analyses the level of compliance with the Financial Action Task Force (FATF) 40 Recommendations and the how the system could be strengthened.

Key Findings

a) China has undertaken a num ber of i niti atives sinc e 200 2 that have contributed positively to its understanding of ML/TF risk, although some important gaps remain. Its framework for domestic AML/CFT co-operation and co-ordination is well established.

36 PBC provi ncial branches has high potenti al to produce finan ci al

intelligence that supports the operational needs of competent authorities but its current functioning results in incomplete access by all parts of the FIU to all data, a fragmented analysis and disseminations, and limits the development of a holistic view. Therefore, major improvements are needed. c) LEAs ha ve access to and use a wide rang e of finan cial in telli gence throughout the lifetime of an investigation, but financial intelligence is not driving ML investigations. When using financial intelligence, LEAs identify predicate cri minal behaviours and a ctively investi gate these. Predicate crime investigation outcomes reflect that China has capable LEAs that are skilled in the inv estigation of complex financial crime and associated predicate cri me. Effective, proport ionate, and dissuasi ve sanctions are available and are applied for ML. d) China has an institutional framework in place to investigate and prosecute TF activities, in line with its understanding of TF risks and in line with its strategy to prevent TF and disrupt TF channels. Since the implementation

1 The following territories were not included as part of this assessment: Hong Kong Special

Administrative Region ( Hong Kong, China ), Macau Sp ecial A dministrative Region (Macau

China) and Chinese Taipei.

6 Ň 6 Ň )$7)C0(201ED 6 Ň

6 | EXECUTIVE SUMMARY of a new counterterrorism law in 2015 and related interpretations, the

number of TF prosecutions and convictions has increased. e) The implementation of TF and PF targeted financial sanctions is negatively affected by three fundamental deficiencies, related to (i) scope of coverage of the requirements and a lack of a prohibition covering all persons and entities; (ii) the types of assets and funds of designated entities that can in practice be frozen, and the type of transactions that can be prohibited; and (iii) a lack of implementation without delay for non-domestic designations. That said, the CTL and relevant PBC Notice are a good starting point for future updates to the legal system in line with revised FATF standards, and to improve effectiv e implementation. While not covered by the FAT F standards, authorities have taken measures in relation to other aspects of

UNSCRs related to DPRK.

f) While FIs have a satisfactory understanding of their AML/CFT obligations, they have not dev eloped a sufficient under stan ding of risks. Measures implemented to miti gate ri sk are generally not co mmensurate wi th different risk situations. g) ǯȀT supervisory system is almost exclusively focused on the financial sector, as t here are no effe cti ve prevent ive or supervisory measures in res pect of the DNFBP sector. Th e PBC has an inadequate understanding of risks overall. A lthou gh their unders tand ing of risk impacting the financial sector is adequate, its understanding of institution- rather than that of the authorities. h) China handle s MLA and extraditi on requests in accordance with the procedures and stan dards for approval stipulated by dom esti c laws, bilateral treaties and multilateral conventions, but due to a complicated decision-making structure for providing MLA or executing extradition requests, it is often a protr acted process. A t the s ame ti me, China can arrange an expedited procedure for urgent requests or cases. There is an effective cooperation in some areas b etween China and some of its neighbours, however, there is a lack of data that would establish effective implementation of ML/TF related co-operation.

Risks and General Situation

2. The main proceeds-generating predicate cr imes i n China are illegal

fundraising, fraud, traffic king in i llicit drugs, corruption and bribe ry, tax crimes, counterfeiting of products, and illegal gambling.

3. China face s a serious th reat fro m terrorism. From 2011 to 2016, C hina

registered 75 terrorist incidents that killed 545 people. The main conflict area and focus for t he authorities is the northwest provi nce of X injiang, from where the "Eastern Turkistan Islamic Movement" (ETIM) operates, but attacks occur

Ň 7 )$7)C0(201ED Ň 7 Ň 7

$QPLPRQH\ OMXQGHULQJ MQG ŃRXQPHUPHUURULVP ILQMQŃLQJ PHMVXUHV LQ FOLQM 201E ‹ )$7) $3* MQG ($* 201E EXECUTIVE SUMMARY | 7 throughout China. Around 60 people each year from Chin a ha ve particip ated as

foreign terrorist fighters in Syria and Iraq2.

4. With total assets of approximately RMB 252 trillion, banks dominate financial

sector activity in China. Based on nature of their products/services and volume of activity, they are considered to be highly vulnerable to abuse with respect to ML/TF. China has witnessed a rapid increase i n the activi ty of online lending entities, primarily via mobile phone platforms

5. The lack of coverage of designated non-financial businesses and professions

(DNFBPs) by the AML/CFT framework is a significant vulnerability. The absence of coverage of do me stic politically exposed per sons (PEPs) is another s ignificant vulnerability, which is particularly noteworthy in the context of a country where corruption is a major predicate offence and state-owned-enterprises play a dominant role in the economy.

6. A large amount of illicit proceeds flows out of China annually. As noted in the

NRA, between 201 4 and 2016 , illi cit pr oceeds totalling RMB 8 64 billion were repatriated to China from over 90 countries. China indicates that illicit proceeds also flow out of the country through underground banking operations. There are several instances in which criminals have fled the country, including suspects in corruption cases. The abuse of legal persons has also been identified as a method of laundering illicit proceeds. Such abuse is facilitated, in part, by ineffective arrangements in place for registering and retaining beneficial ownership (BO) information. Overall Level of Effectiveness and Technical Compliance

7. China has a good legal framework with respect to the criminalization of ML

and TF, national coordination arrangements, the powers and responsibilities of law enforcement authorities and arrangements for international cooperation. There is scope for strengthening the legal framework with respect to a number of preventive measures and the coverage and supervision of DNFBPs.

8. An incomplete understanding of risk impacts negatively on the effectiveness

2 See for example The Soufa n Group Fore ign Fighters Upd ate Final 2015

(www.soufangroup.com/foreign-fighters), but also see paragraph 230 of this report for other estimates (up to 300 persons).

8 Ň 8 Ň )$7)C0(201ED 8 Ň

8 | EXECUTIVE SUMMARY implementation of preventive measures by FIs, the supervision of these institutions

and the in vestigation and prosecution of ML. We akness es in ins tituti onal arrangements and related practice s impac t negatively on the effec tiveness with respect to the use of financial intelligence.

9. There are si gn ificant weaknesses in both tec hnical compliance and

quotesdbs_dbs41.pdfusesText_41
[PDF] problématique places and forms of power segregation

[PDF] problematique espace et echange anglais immigration

[PDF] cours fonction homographique seconde

[PDF] how are us soldiers portrayed in american war films

[PDF] myths and heroes war

[PDF] we were soldiers

[PDF] platoon

[PDF] myth and heroes vietnam war

[PDF] fonction homographique exemple

[PDF] idea of progress pdf

[PDF] fonction homographique sens de variation

[PDF] tableau de variation fonction homographique

[PDF] fonction homographique formule

[PDF] inéquation fonction homographique

[PDF] apprendre ? démontrer en mathématiques