The leading knowledge platform for the financial technology industry
The leading knowledge platform for the financial technology industry

A-Team Insight Blogs

Despite Lack of Standards, Legal Entity Data Will Become Centre of Data Operations

Although standards for legal entity data are likely to evolve over time and become more rigorous, there does not exist today a standard directory of identifiers for legal entities across global jurisdictions, said James Redfern, head of sales and marketing at CounterpartyLink. But with an average of 27% of company records held at financial institutions deemed inaccurate, firms need to figure out how to fix these problems and then continue to maintain the database in the absence of any industry standard, particularly in current conditions, he suggested.

Redfern said, “The entity is the key element in the middle; it will become the centre of data operations.” Key to managing entity data is getting the linkages right, he said, referring to both the linking of entity data, which can quickly become complex, but also linking of disparate sources to gather that information, be that the registration authorities, regulators, exchanges, or other sources. Said Redfern, “But the linkages are rendered worthless if the data it is linked to is inaccurate or not fit for purpose.”

He promoted CounterpartyLink’s Client Data Audit Report as a useful independent auditing service that could be used within business cases for senior management. But the audit can also be very useful for helping to prioritise cleansing and maintenance work, for example prioritising the higher risk entities over those with lower risk or less exposure.

Through conducting such audits for clients, Redfern said that the most common areas for data impurities were: ownership (12%), company name (8%), registered address/headquarters (7%), regulator (6%), registration (5%), and identifiers (4%).

At least one senior member of the US Federal Reserve had highlighted entity data as a key ‘broken’ factor in risk assessment, perhaps indicating a likelihood of further examination of the issue and potential regulation down the line. But as Redfern pointed out, “It is beneficiary to have standards, but business will continue without them.”

Related content

WEBINAR

Recorded Webinar: Entity identification and client lifecycle management – How financial institutions can drive $4 billion in cost savings

A new model in Legal Entity Identifier (LEI) issuance has created significant opportunities for financial institutions to capitalise on their KYC and AML due diligence. By becoming Validation Agents and obtaining LEIs on behalf of their clients, financial institutions can enhance their client onboarding experience, streamline their internal operations, and open the door to new,...

BLOG

A-Team Group Data Management Summit Virtual Hit the Hot Topics of Data Strategy, Regulatory Reporting, KYC and Onboarding

A-Team Group’s Data Management Summit Virtual, hosted last week by president and chief content officer Andrew Delaney, got off to a great start with a day one keynote by Deborah Lorenzen, managing director, head of enterprise data governance at State Street. Lorenzen was followed by panel sessions focused on using data strategy to drive data...

EVENT

LIVE Briefing: ESG Data Management – A Strategic Imperative

This breakfast briefing will explore challenges around assembling and evaluating ESG data for reporting and the impact of regulatory measures and industry collaboration on transparency and standardisation efforts. Expert speakers will address how the evolving market infrastructure is developing and the role of new technologies and alternative data in improving insight and filling data gaps.

GUIDE

Entity Data Management Handbook – Seventh Edition

Sourcing entity data and ensuring efficient and effective entity data management is a challenge for many financial institutions as volumes of data rise, more regulations require entity data in reporting, and the fight again financial crime is escalated by bad actors using increasingly sophisticated techniques to attack processes and systems. That said, based on best...