RegTech Insight Financial Crime, KYC & AML The latest content from across the platform
CGS and Ipreo Extend Partnership to Streamline Identifier Issuance for new Securities in Equity and Fixed Income Markets
Cusip Global Services (CGS) and Ipreo are building out an existing relationship in the US municipal market to allow users of Ipreo’s security issuance software in global equity and fixed income markets to automatically submit requests for Cusip and ISIN identifiers through the company’s global cross-asset class book building system. Once created, the identifiers are…
What’s Missing from your Client Onboarding Process?
There’s now a spotlight shining on the process of client onboarding due to regulations that are driving change in what is typically a fragmented and decentralised approach. While many firms recognise that getting their onboarding house in order is essential to achieving regulatory compliance and avoiding hefty penalties, addressing those functions in isolation is not…
Data Management Summit: Guidelines for Effective Data Governance
Data governance is increasingly important in a data management environment driven by regulatory requirements and cost constraints, but to be effective it needs to be underpinned by cultural change across an organisation, supported by active data governance committees and able to ensure ongoing ownership of core datasets. The need for effective data governance to address…
All You Need to Know About Entity Data
We’ve been tracking entity data and issues around its management for a good number of years now. In fact, the topic of Legal Entity Identifiers was one of our hottest for a couple of years. And while the emphasis continues to shift (right now, client onboarding is what it’s all about!), the issue at the…
Entity Data Management Handbook
Following on from the success of our Regulatory Data Handbook, A-Team Group is pleased to introduce its new Entity Data Management Handbook which is available for free download. This Handbook is the ultimate guide to all things entity data: Why Entity Data is important A full review of Legal Entity Identifiers (LEIs) Where they came…
Data Management Summit: Arguing the Case for Shared Services
The A-Team Group Data Management Summit held in London this week opened with a review of the company’s Regulatory Data Index and a keynote presentation by Nick Murphy, director of consulting at IGATE, on the potential of shared services or utilities for reference data management. Regulatory Data Index The A-Team Regulatory Data Index sponsored by…
iMeta Technologies Integrates Assassin Entity Data Management Platform with Avox Web Services
iMeta Technologies has integrated its Assassin entity data management platform with Avox’s recently released web services to deliver an automated solution for client onboarding and ongoing client data management. Avox introduced web services based on application programming interfaces (APIs) that are designed to provide fast electronic access to its legal entity data early this month….
Opinion: How Machine Learning Solves Client Onboarding, by Adam Devine, WorkFusion
Brute force can’t solve onboarding. Machine learning can. Here’s how. Throwing headcount at the ubiquitous client onboarding problem hasn’t worked. It’s still a mess. Offshoring just sweeps the mess under the rug, and the expression, “misery loves company” is a good way of describing the impact of utility plays. Every onboarding solution on the market…
CounterpartyLink Provides LEI Data Hierarchies that Should Meet the Needs of the Global LEI System
CounterpartyLink (CPL) is building out its Legal Entity Identifier (LEI) data on a daily basis and adding hierarchy data to the identifiers. The hierarchy data will help financial firms meet the requirements of the Regulatory Oversight Committee (ROC) of the LEI for hierarchical structures, and is already being used by firms seeking a clearer understanding…
Opinion: Push Me, Pull You
By Neill Vanlint, Global Head of Sales & Services, Goldensource Manual reminders. Consulting external websites. Receiving files overnight. Checking discrepancies. Manually keying in changes. Alerting compliance. Sounds like data management practices from about 20 years ago, right? Not so. While you wouldn’t dream of following this ‘pull’ process with security data, say to check for…

