I. Introduction
Anti-money laundering compliance training in the Philippines is not merely an internal corporate governance exercise. It is a legal, regulatory, and risk-management obligation for covered persons and institutions operating within the Philippine financial system and related sectors. The purpose of AML training is to ensure that directors, officers, employees, agents, and relevant personnel understand how to detect, prevent, report, and respond to money laundering, terrorist financing, proliferation financing, and related financial crimes.
In the Philippine context, AML compliance training is shaped primarily by the Anti-Money Laundering Act of 2001, as amended, commonly referred to as the AMLA, its implementing rules and regulations, and issuances of the Anti-Money Laundering Council, or AMLC. It is also influenced by supervisory rules issued by regulators such as the Bangko Sentral ng Pilipinas, Securities and Exchange Commission, Insurance Commission, and other competent authorities overseeing covered persons.
AML training is a central component of a covered institution’s AML compliance program. Without effective training, even a formally compliant AML framework can fail in practice. Employees may miss red flags, mishandle customer due diligence, delay suspicious transaction reporting, improperly tip off customers, or expose the institution and its officers to administrative, civil, or criminal liability.
II. Legal Framework for AML Compliance in the Philippines
The principal law governing anti-money laundering compliance in the Philippines is Republic Act No. 9160, or the Anti-Money Laundering Act of 2001, as amended by subsequent laws. The AMLA created the AMLC and established preventive, reporting, investigative, and enforcement mechanisms against money laundering.
The AMLA has been amended several times to broaden its coverage, strengthen enforcement, include more predicate offenses, expand reporting obligations, and align the Philippines with international standards, particularly those of the Financial Action Task Force.
Other important legal and regulatory sources include:
- The Revised Implementing Rules and Regulations of the AMLA;
- AMLC resolutions, advisories, guidelines, and registration rules;
- BSP circulars and manuals for banks, money service businesses, electronic money issuers, virtual asset service providers, and other BSP-supervised financial institutions;
- SEC rules for securities brokers, dealers, investment houses, financing companies, lending companies, foundations, and other covered entities under its supervision;
- Insurance Commission rules for insurance companies, brokers, agents, and related entities;
- Rules concerning counter-terrorism financing, particularly under laws and regulations implementing obligations against terrorist financing;
- Data privacy laws, especially the Data Privacy Act of 2012, where customer information is collected, verified, retained, shared, and reported;
- Corporate governance rules requiring board oversight, internal controls, risk management, audit, and compliance systems.
AML training must therefore be understood as part of a wider legal ecosystem. It is not limited to teaching employees how to file reports. It includes risk assessment, customer due diligence, beneficial ownership identification, recordkeeping, sanctions screening, transaction monitoring, internal escalation, confidentiality, and regulatory cooperation.
III. Meaning of Money Laundering
Money laundering is the process by which proceeds of unlawful activity are made to appear legitimate. In Philippine law, money laundering is committed when a person transacts, converts, transfers, disposes of, moves, acquires, possesses, uses, conceals, disguises, attempts, aids, abets, assists, or facilitates transactions involving monetary instruments or property that represent proceeds of unlawful activity.
Money laundering typically involves three conceptual stages:
Placement is the introduction of illegal proceeds into the financial system. Examples include depositing cash into bank accounts, buying monetary instruments, using remittance channels, purchasing casino chips, or converting cash into digital or virtual assets.
Layering is the process of obscuring the source, ownership, or trail of funds through complex transactions. Examples include multiple transfers, shell companies, false invoices, trade-based schemes, cross-border remittances, or rapid movement through several accounts.
Integration is the re-entry of laundered funds into the legitimate economy. Examples include investment in real estate, businesses, securities, luxury assets, insurance products, or lending arrangements.
An effective AML training program must make employees understand that money laundering may appear as ordinary business activity. It is often disguised through normal-looking accounts, routine commercial transactions, or apparently legitimate customer relationships.
IV. Covered Persons and Institutions
AML obligations apply to covered persons under Philippine law. These include, among others:
- Banks and non-bank financial institutions;
- Quasi-banks, trust entities, and financing companies;
- Money service businesses, remittance agents, foreign exchange dealers, and money changers;
- Electronic money issuers and payment system participants;
- Securities brokers, dealers, investment houses, investment companies, mutual fund companies, and related capital market participants;
- Insurance companies, pre-need companies, insurance brokers, and agents;
- Casinos, including internet and ship-based casinos where covered;
- Jewelry dealers in precious metals and stones for covered transactions;
- Company service providers under certain circumstances;
- Real estate developers and brokers for covered transactions;
- Virtual asset service providers where regulated as covered persons;
- Other persons or entities designated by law or regulation.
The scope of AML training depends on the nature of the covered person. A universal bank will require a more complex training structure than a small remittance agent. A casino will need training tailored to gaming transactions, junket operations, high-value chip purchases, and customer identification at threshold levels. A real estate broker must understand red flags involving beneficial ownership, nominee buyers, unusual payment arrangements, and politically exposed persons.
V. Purpose of AML Compliance Training
AML compliance training serves several legal and operational purposes.
First, it ensures that personnel know the institution’s duties under law and regulation. Employees must understand covered transaction reporting, suspicious transaction reporting, customer due diligence, record retention, internal escalation, and confidentiality.
Second, it reduces institutional exposure to enforcement action. Regulators may treat inadequate training as evidence of a weak AML compliance framework.
Third, it protects the institution from criminal misuse. Money launderers exploit weak controls, inexperienced staff, and institutions with poor compliance culture.
Fourth, it supports individual accountability. Directors, senior management, compliance officers, front-line employees, and operations personnel may each have obligations depending on their roles.
Fifth, it strengthens documentation. A well-designed training program creates records showing that the institution took reasonable steps to educate and supervise personnel.
Sixth, it promotes a culture of compliance. AML controls work best when employees understand that compliance is not an obstacle to business but a condition for lawful business.
VI. Required Elements of an AML Compliance Program
AML training should be integrated into the covered person’s broader AML compliance program. A sound AML compliance program generally includes:
- A written AML policy approved by the board or senior management;
- A designated compliance officer or AML compliance function;
- Risk assessment procedures;
- Customer due diligence and enhanced due diligence rules;
- Beneficial ownership identification procedures;
- Covered transaction and suspicious transaction monitoring;
- Internal reporting and escalation mechanisms;
- Regulatory reporting procedures;
- Recordkeeping and retention systems;
- Independent audit or testing;
- Screening against sanctions, watchlists, politically exposed persons, and other risk indicators;
- Training for directors, officers, employees, and relevant agents;
- Periodic review and updating of policies.
Training is not separate from these elements. It is the means by which the AML compliance program becomes operational.
VII. Board and Senior Management Responsibility
In the Philippines, AML compliance is not solely the responsibility of the compliance officer. The board of directors and senior management are expected to exercise oversight over the institution’s AML framework.
Training for the board and senior management should cover:
- Legal responsibilities under the AMLA and related regulations;
- Regulatory expectations for governance and internal controls;
- Institutional AML risk profile;
- Consequences of non-compliance;
- Approval and review of AML policies;
- Resource allocation for compliance;
- Oversight of the compliance officer;
- Audit findings and remediation;
- High-risk business lines, products, customers, and jurisdictions;
- Reporting obligations and confidentiality requirements.
Board-level training should be strategic, not merely operational. Directors need not know every technical step in filing reports, but they must understand the institution’s exposure and their oversight obligations.
VIII. Role of the Compliance Officer
The AML compliance officer plays a central role in designing, implementing, and monitoring the AML program. Training for compliance officers should be more advanced than general employee training.
The compliance officer should be trained on:
- AMLA and implementing rules;
- AMLC registration and reporting systems;
- Covered transaction reports;
- Suspicious transaction reports;
- Customer risk assessment;
- Enhanced due diligence;
- Beneficial ownership rules;
- Sanctions and watchlist screening;
- Transaction monitoring systems;
- Internal investigation procedures;
- Regulatory examination preparation;
- Recordkeeping;
- Data privacy implications;
- Audit coordination;
- Staff training design;
- Updates in AML laws and regulations.
The compliance officer should also be capable of translating legal requirements into operational policies. Training should therefore include both legal and practical components.
IX. Employee Training by Function
AML training should be role-based. A single generic seminar is rarely sufficient for a covered institution with multiple business lines.
A. Front-Line Staff
Front-line staff interact directly with customers. They must understand customer identification, verification, red flags, suspicious behavior, and escalation procedures.
Training should include:
- Know-your-customer procedures;
- Acceptable identification documents;
- Beneficial ownership questions;
- Politically exposed person identification;
- Red flags during onboarding;
- Handling reluctant or evasive customers;
- Escalating suspicious behavior;
- Avoiding tipping off;
- Documentation standards.
B. Operations and Back-Office Personnel
Operations personnel process transactions and may detect irregular patterns not visible at onboarding.
Training should include:
- Transaction monitoring;
- Unusual transaction patterns;
- Structuring or smurfing;
- Rapid movement of funds;
- Dormant account reactivation;
- Multiple accounts with common control;
- Unusual remittance flows;
- Recordkeeping;
- Internal reporting.
C. Relationship Managers and Sales Personnel
Relationship managers may face pressure to onboard or retain customers despite AML concerns.
Training should include:
- Managing business and compliance conflicts;
- Enhanced due diligence for high-value clients;
- Politically exposed persons;
- Source of funds and source of wealth;
- High-risk industries;
- Use of nominees and intermediaries;
- Escalation of suspicious activity;
- Prohibition against ignoring red flags.
D. Compliance and Legal Teams
Compliance and legal personnel need advanced training on statutory interpretation, regulatory expectations, reporting standards, investigations, and enforcement exposure.
Training should include:
- Legal elements of money laundering;
- Predicate offenses;
- Suspicious transaction analysis;
- AMLC reporting;
- Freezing and inquiry orders;
- Subpoenas and regulatory requests;
- Confidentiality and bank secrecy issues;
- Interaction with data privacy rules;
- Enforcement trends;
- Remediation planning.
E. Internal Audit
Internal audit must independently test the AML program.
Training should include:
- Audit methodology for AML controls;
- Sampling and testing of customer files;
- Testing transaction monitoring alerts;
- Reviewing reporting timeliness;
- Evaluating training effectiveness;
- Identifying policy gaps;
- Reporting findings to the board or audit committee.
F. Information Technology Personnel
IT personnel support AML systems, screening tools, data retention, and reporting platforms.
Training should include:
- AML system access controls;
- Data integrity;
- Automated transaction monitoring;
- Sanctions screening tools;
- System change management;
- Audit trails;
- Cybersecurity risks linked to financial crime;
- Data retention and retrieval.
X. Customer Due Diligence Training
Customer due diligence, or CDD, is one of the most important AML controls. Training must ensure that personnel know how to identify and verify customers before or during the establishment of business relations, depending on the applicable rules.
CDD training should cover:
- Identification of natural persons;
- Identification of juridical persons;
- Verification using reliable and independent documents, data, or information;
- Understanding the nature and purpose of the business relationship;
- Determining source of funds where required;
- Determining source of wealth for high-risk customers;
- Identifying beneficial owners;
- Ongoing monitoring;
- Updating customer information;
- Refusal or termination of relationships where CDD cannot be completed.
For juridical entities, employees should be trained to review documents such as articles of incorporation, certificates of registration, general information sheets, board resolutions, secretary’s certificates, partnership documents, business permits, and authority of signatories.
CDD training must also explain that identification is not a mere paperwork exercise. Employees must assess whether customer information makes sense in light of the customer’s profile, business, transaction behavior, and declared purpose.
XI. Beneficial Ownership Training
Beneficial ownership is a critical AML concept. Money launderers frequently use corporations, nominees, trusts, foundations, associations, partnerships, and layered ownership structures to hide the true owner or controller of assets.
Training should explain that a beneficial owner is generally the natural person who ultimately owns, controls, or benefits from a customer or transaction. Personnel should be taught to look beyond the registered shareholder, nominee director, authorized signatory, or corporate representative.
Training should include:
- How to identify ownership percentages;
- How to identify control through voting rights or agreements;
- How to identify control through senior management;
- How to recognize nominee arrangements;
- How to detect shell or shelf companies;
- How to assess complex ownership chains;
- When to escalate unclear ownership structures;
- When enhanced due diligence is required.
Employees should be trained to ask: Who truly owns the funds? Who controls the account? Who benefits from the transaction? Who gave the instructions? Who bears the economic risk?
XII. Politically Exposed Persons
A politically exposed person, or PEP, is a person who is or has been entrusted with a prominent public position, including relevant family members and close associates depending on applicable rules. PEPs are not prohibited customers, but they present higher AML and corruption risks.
Training should cover:
- Identification of domestic and foreign PEPs;
- Family members and close associates;
- Senior management approval requirements where applicable;
- Source of wealth and source of funds verification;
- Ongoing monitoring;
- Adverse media screening;
- Red flags involving government contracts, unexplained wealth, or use of relatives and associates;
- Enhanced due diligence expectations.
In the Philippine context, PEP training is especially important because corruption-related predicate offenses can generate proceeds that enter the financial system through banks, real estate, securities, insurance, casinos, or corporate vehicles.
XIII. Covered Transaction Reporting
Covered persons are required to report certain transactions that meet statutory or regulatory thresholds. These are generally called covered transaction reports, or CTRs.
Training must explain:
- What transactions are covered;
- Applicable monetary thresholds;
- How to aggregate transactions where required;
- How to identify transactions that appear structured to avoid reporting;
- Internal workflows for preparing and submitting reports;
- Timelines for reporting;
- Required information fields;
- Quality control before submission;
- Recordkeeping of submitted reports.
Employees must understand that covered transaction reporting is generally threshold-based and does not require proof of criminality. However, a covered transaction may also be suspicious if accompanied by red flags.
XIV. Suspicious Transaction Reporting
Suspicious transaction reporting is one of the most important AML obligations. Unlike covered transaction reporting, suspicious transaction reporting is based on suspicion, unusual circumstances, or red flags.
Training should explain that a suspicious transaction may exist where:
- There is no underlying legal or trade obligation, purpose, or economic justification;
- The customer is not properly identified;
- The amount involved is not commensurate with the customer’s business or financial capacity;
- The transaction is structured to avoid reporting thresholds;
- The transaction deviates from the customer’s profile;
- The transaction involves proceeds of unlawful activity;
- The customer refuses to provide required information;
- The transaction involves high-risk jurisdictions, persons, or industries;
- The transaction appears unusually complex;
- Circumstances suggest concealment, disguise, or evasion.
Training should stress that employees do not need proof beyond reasonable doubt before escalating suspicious activity internally. Their role is to identify and report red flags to the designated AML function. The compliance function then evaluates whether a suspicious transaction report, or STR, must be filed with the AMLC.
XV. Prohibition Against Tipping Off
One of the most sensitive areas of AML training is the prohibition against tipping off. Employees must not inform a customer or unauthorized person that a suspicious transaction report has been or will be filed, or that an AML investigation or review is underway.
Training should include:
- What constitutes tipping off;
- Examples of prohibited statements;
- How to communicate with customers without revealing suspicion;
- Who may access STR-related information internally;
- Confidential handling of AML investigations;
- Consequences of unauthorized disclosure.
For example, an employee should not tell a customer: “Your transaction is suspicious, so we need to report it to AMLC.” Instead, the employee should follow approved scripts, request routine documentation where appropriate, and escalate internally.
XVI. Recordkeeping Requirements
AML compliance requires proper recordkeeping. Training must ensure that employees understand which records must be retained, how long they must be retained, and how they must be protected.
Records may include:
- Customer identification documents;
- Account opening forms;
- Beneficial ownership declarations;
- Transaction records;
- Due diligence documents;
- Enhanced due diligence approvals;
- Internal suspicious activity referrals;
- CTRs and STRs;
- Training attendance records;
- Audit reports;
- Compliance testing results;
- Correspondence with regulators.
Recordkeeping training should also address data privacy, access controls, confidentiality, secure storage, retrieval, and destruction after the applicable retention period.
XVII. Risk-Based Approach
Philippine AML regulation follows a risk-based approach. This means covered persons must identify, assess, understand, and mitigate their money laundering and terrorist financing risks.
Training should explain risk factors such as:
- Customer type;
- Product or service;
- Delivery channel;
- Geographic exposure;
- Transaction size and frequency;
- Source of funds;
- Source of wealth;
- Industry or occupation;
- Ownership structure;
- Use of intermediaries;
- Cross-border activity;
- Technology or anonymity features.
Employees should understand that not all customers present the same level of risk. Low-risk customers may require simplified or standard measures where permitted, while high-risk customers require enhanced due diligence and closer monitoring.
XVIII. Enhanced Due Diligence
Enhanced due diligence, or EDD, is required for higher-risk customers, transactions, or situations. Training should explain when EDD is triggered and how it is performed.
EDD may involve:
- Obtaining additional identification documents;
- Verifying source of funds;
- Verifying source of wealth;
- Obtaining senior management approval;
- Conducting adverse media checks;
- Reviewing business operations;
- Examining corporate ownership structures;
- Monitoring transactions more frequently;
- Setting transaction limits;
- Requiring updated documents;
- Declining or terminating relationships where risk cannot be managed.
High-risk examples include PEPs, complex corporate structures, cash-intensive businesses, high-value dealers, foreign customers from high-risk jurisdictions, customers with adverse media, and transactions inconsistent with known profiles.
XIX. Red Flags in the Philippine Context
AML training should be practical and should use red flags relevant to Philippine business conditions.
Common red flags include:
- A customer deposits large cash amounts inconsistent with declared income;
- Several individuals send funds to one account without clear purpose;
- A customer uses multiple branches or agents to avoid thresholds;
- A remittance recipient receives frequent transfers from unrelated senders;
- A real estate buyer pays in cash or through multiple third parties;
- A corporation has no visible business but receives large transfers;
- A customer refuses to disclose beneficial ownership;
- A customer uses nominees, relatives, or employees as account holders;
- Funds are quickly moved out after deposit;
- Transactions involve high-risk jurisdictions without business explanation;
- A customer frequently cancels transactions after learning documentation requirements;
- A customer insists on unusual secrecy;
- Transactions are inconsistent with the customer’s age, occupation, or business;
- A small business receives international transfers unrelated to its declared operations;
- A customer purchases insurance products and quickly surrenders them;
- Securities transactions show no rational investment purpose;
- Casino transactions involve large buy-ins with minimal gaming activity;
- Virtual asset transactions involve rapid conversion and transfer to unknown wallets;
- A company has layers of corporate shareholders with no commercial rationale;
- A government official or associate engages in transactions inconsistent with lawful income.
Training should make clear that a red flag does not automatically prove money laundering. It requires inquiry, documentation, escalation, and possible reporting.
XX. Predicate Offenses
Money laundering under Philippine law is tied to unlawful activities or predicate offenses. Training should familiarize employees with common predicate offenses, without requiring them to become criminal prosecutors.
Predicate offenses may include serious crimes such as:
- Drug trafficking;
- Graft and corruption;
- Plunder;
- Kidnapping for ransom;
- Robbery and extortion;
- Smuggling;
- Swindling and other frauds;
- Qualified theft;
- Jueteng and other illegal gambling offenses;
- Piracy;
- Terrorism and terrorist financing;
- Securities fraud;
- Cybercrime-related offenses;
- Tax-related offenses where covered;
- Human trafficking;
- Environmental crimes where covered;
- Other offenses included under the AMLA and subsequent amendments.
Employees do not need to prove the predicate offense. However, they should understand how criminal proceeds can enter their institution and why suspicious indicators matter.
XXI. Terrorist Financing and Proliferation Financing
AML training in the Philippines should not be limited to money laundering. It should also address terrorist financing and proliferation financing.
Terrorist financing involves raising, moving, storing, or using funds or property for terrorism or terrorist organizations. Unlike traditional money laundering, terrorist financing may involve funds from lawful sources used for unlawful purposes.
Training should cover:
- Sanctions screening;
- Designated persons and entities;
- Small-value but frequent transfers;
- Use of charities or non-profit organizations;
- Cross-border fund flows;
- High-risk conflict areas;
- Freezing obligations;
- Immediate escalation of possible matches;
- Reporting requirements.
Proliferation financing involves funds or services connected to weapons of mass destruction proliferation. Covered persons should train relevant employees on sanctions, dual-use goods, trade finance risks, and screening obligations where applicable.
XXII. Sector-Specific AML Training
A. Banks
Banks require the most extensive AML training because of their central role in deposits, loans, remittances, trade finance, trust products, and payment systems.
Training should cover account opening, deposit monitoring, wire transfers, correspondent banking, trade-based money laundering, private banking, trust accounts, loan repayments from suspicious sources, dormant account reactivation, and beneficial ownership.
B. Money Service Businesses
Money remittance and foreign exchange businesses face risks involving structuring, multiple senders or recipients, false identities, cross-border transfers, and use of agents.
Training should emphasize identification, transaction limits, aggregation, unusual patterns, agent oversight, sanctions screening, and suspicious transaction escalation.
C. Electronic Money Issuers and Payment Platforms
Digital financial services present risks involving rapid onboarding, account takeover, mule accounts, fraud proceeds, layering through wallets, and cross-platform transfers.
Training should include e-KYC, device and account monitoring, mule indicators, fraud typologies, transaction velocity, wallet limits, cybersecurity coordination, and suspicious activity reporting.
D. Virtual Asset Service Providers
Virtual assets may be used for rapid cross-border value transfer, anonymity-enhancing techniques, scams, ransomware proceeds, darknet markets, and sanctions evasion.
Training should cover wallet risk indicators, blockchain analytics, source and destination of virtual assets, customer risk profiling, travel rule concepts where applicable, suspicious wallet activity, and conversion between fiat and virtual assets.
E. Securities Firms
Securities brokers and dealers should train staff on market manipulation proceeds, suspicious trading, nominee accounts, rapid buying and selling without economic purpose, third-party funding, and unusual settlement arrangements.
F. Insurance Companies
Insurance-related AML risks include single-premium policies, overpayment of premiums, early surrender, third-party payments, assignment of policies, and use of insurance products as integration tools.
Training should cover policyholder identification, beneficiary identification, source of funds, premium payment monitoring, surrender red flags, and suspicious claims.
G. Casinos
Casino AML training should cover customer identification thresholds, chip purchases, cash-in/cash-out behavior, minimal gaming, junket operations, high rollers, third-party funding, redemption patterns, and suspicious transaction reporting.
H. Real Estate Sector
Real estate is vulnerable to integration of illicit funds. Training for developers and brokers should cover cash purchases, third-party payments, nominees, undervaluation or overvaluation, rapid resale, foreign buyers, PEPs, corporate buyers, and beneficial ownership.
I. Dealers in Precious Metals and Stones
Jewelry and precious metals businesses should train personnel on high-value cash purchases, repeated small purchases, resale behavior, third-party buyers, lack of concern over price, and use of portable high-value assets.
XXIII. Training on AMLC Reporting Systems
Covered persons must understand how to register with and report to the AMLC where required. Training for compliance personnel should include:
- Account creation and authorization;
- User roles and access management;
- Report preparation;
- Report validation;
- Timely submission;
- Error correction;
- Secure storage of submitted reports;
- Regulatory correspondence;
- Internal approval processes;
- Contingency plans for system issues.
Only authorized personnel should file reports. However, other employees must know how internal escalation reaches the reporting function.
XXIV. AML Training and Data Privacy
AML compliance requires the collection and processing of personal information. This creates an intersection with the Data Privacy Act of 2012.
Training should explain that personal data may be processed for compliance with legal obligations, but access, use, storage, and disclosure must still be controlled. Employees should not casually share customer documents, identification records, STR-related information, or investigation materials.
Training should cover:
- Lawful basis for data collection;
- Data minimization;
- Secure storage;
- Access controls;
- Confidentiality;
- Data sharing with regulators;
- Breach prevention;
- Retention periods;
- Disposal of records;
- Handling customer requests without compromising AML obligations.
AML and data privacy are not mutually exclusive. The institution must comply with both.
XXV. Training Frequency
AML training should not be a one-time event. It should be periodic, documented, and updated.
A strong training program includes:
- Induction training for new hires before or shortly after assuming duties;
- Annual refresher training for relevant personnel;
- Role-specific training for high-risk functions;
- Specialized training for compliance, audit, and senior management;
- Update training after major legal or regulatory changes;
- Remedial training after audit findings, compliance breaches, or regulatory observations;
- Training for agents, representatives, and outsourced service providers where relevant.
The frequency should correspond to the institution’s risk profile. High-risk sectors should train more frequently and more deeply.
XXVI. Training Methods
AML training may be delivered through different formats, including:
- Classroom seminars;
- Online modules;
- Live webinars;
- Case studies;
- Scenario-based workshops;
- Tabletop exercises;
- Internal newsletters;
- Compliance bulletins;
- Quizzes and assessments;
- Role-playing exercises;
- System walkthroughs;
- Regulatory update briefings.
The best training programs use practical examples. Employees should not merely memorize the AMLA. They should learn how suspicious activity appears in actual transactions.
XXVII. Documentation of Training
Regulators may ask for evidence of AML training. Institutions should maintain complete records.
Training records should include:
- Training title;
- Date and duration;
- Training materials;
- Trainer name and qualifications;
- Attendee list;
- Department or role of attendees;
- Assessment results;
- Acknowledgment forms;
- Remedial training records;
- Board or management reports;
- Training calendar;
- Evidence of updates to training content.
Training documentation is important because an institution may need to prove that it took reasonable steps to educate its personnel.
XXVIII. Testing Training Effectiveness
Attendance alone does not prove effectiveness. A sound AML training program should test whether employees understood and can apply the material.
Effectiveness may be measured through:
- Quizzes;
- Case analysis;
- Simulated suspicious transactions;
- Mystery testing;
- Audit findings;
- Quality of internal referrals;
- Timeliness of escalation;
- Reduction in repeat compliance errors;
- Employee feedback;
- Regulatory examination results;
- Monitoring of business units with recurring deficiencies.
Where employees fail assessments, remedial training should be required.
XXIX. Common Deficiencies in AML Training
Common weaknesses include:
- Training limited to annual lectures with no practical application;
- Failure to train directors and senior management;
- Same training for all employees regardless of role;
- Outdated materials;
- No documentation of attendance;
- No testing or assessment;
- Failure to train agents or outsourced personnel;
- Training that ignores new products or technologies;
- Failure to cover terrorist financing and sanctions;
- Lack of sector-specific red flags;
- No training after audit findings;
- Failure to explain tipping-off rules;
- Overemphasis on covered transactions and underemphasis on suspicious transactions.
These deficiencies can lead to regulatory criticism and operational failure.
XXX. Consequences of Non-Compliance
Failure to implement effective AML training may expose covered persons and responsible individuals to several consequences.
A. Administrative Sanctions
Regulators may impose penalties, directives, restrictions, reprimands, or other administrative measures for AML deficiencies. Inadequate training may be cited as part of a broader compliance failure.
B. Civil and Regulatory Exposure
Institutions may face regulatory enforcement, increased examination scrutiny, remediation requirements, and reputational damage.
C. Criminal Exposure
Where money laundering, willful blindness, or participation in unlawful transactions is involved, criminal liability may arise under applicable laws.
D. Reputational Harm
AML failures can damage public trust, correspondent relationships, investor confidence, and business partnerships.
E. Operational Restrictions
Severe deficiencies may lead to restrictions on products, branches, licenses, or business activities depending on the regulator and circumstances.
XXXI. AML Training for Small and Medium-Sized Covered Persons
Smaller covered persons may not have the resources of large financial institutions, but they are still expected to implement proportionate AML training.
A small covered person should at minimum have:
- Basic AML orientation for all relevant staff;
- Written procedures for customer identification;
- Red flag guidance;
- Internal escalation process;
- Compliance officer training;
- Reporting procedure to AMLC where applicable;
- Recordkeeping instructions;
- Annual refresher training;
- Documentation of attendance.
A risk-based approach allows proportionality, but it does not excuse inaction.
XXXII. Outsourcing and Third-Party Training
Covered persons may outsource certain AML functions or training delivery, but accountability remains with the covered person. Outsourcing training does not transfer legal responsibility.
Where third-party trainers are used, the institution should ensure that:
- The content is Philippine-specific;
- The trainer understands the institution’s sector;
- Materials are updated;
- Attendance is documented;
- Training includes internal policies;
- Employees are tested;
- The board or management receives reports.
Generic international AML training is insufficient if it does not address Philippine law, AMLC requirements, local regulators, and local typologies.
XXXIII. AML Training and Corporate Governance
AML compliance training is part of corporate governance. It supports accountability, internal controls, risk management, and ethical business conduct.
The board should receive regular reports on:
- Training completion rates;
- High-risk units trained;
- Failed assessments;
- Remedial actions;
- Regulatory updates included in training;
- Audit findings related to training;
- Training plans for the next period.
A board-approved AML training policy should define responsibilities, frequency, target participants, content standards, and documentation requirements.
XXXIV. Model AML Training Curriculum
A comprehensive Philippine AML training curriculum may include the following modules:
Module 1: Introduction to AML Law
This module covers the AMLA, AMLC, covered persons, money laundering offenses, predicate offenses, and regulatory expectations.
Module 2: Customer Due Diligence
This module covers customer identification, verification, beneficial ownership, risk rating, and onboarding.
Module 3: Enhanced Due Diligence
This module covers PEPs, high-risk customers, source of funds, source of wealth, adverse media, and senior management approval.
Module 4: Transaction Monitoring
This module covers unusual activity, transaction patterns, structuring, aggregation, and monitoring systems.
Module 5: Covered and Suspicious Transaction Reporting
This module covers CTRs, STRs, internal escalation, reporting timelines, documentation, and quality control.
Module 6: Tipping Off and Confidentiality
This module covers prohibited disclosures, handling customer inquiries, internal access restrictions, and sanctions for breaches.
Module 7: Terrorist Financing and Sanctions
This module covers terrorist financing, designated persons, freezing obligations, screening, and escalation.
Module 8: Sector-Specific Typologies
This module covers risks specific to banking, remittance, securities, insurance, casino, real estate, virtual assets, or other relevant sectors.
Module 9: Data Privacy and Recordkeeping
This module covers AML records, customer data, confidentiality, retention, and secure disposal.
Module 10: Case Studies and Assessment
This module uses realistic Philippine scenarios and tests employee understanding.
XXXV. Practical Examples for Training
Example 1: Structuring
A customer deposits ₱480,000 several times in one week at different branches. The amount is below a reporting threshold, but the pattern suggests an attempt to avoid detection. Employees should escalate internally.
Example 2: Real Estate Nominee
A young employee with modest income purchases a high-value condominium in cash. Payment instructions come from an unrelated third party. The buyer refuses to explain the source of funds. This requires enhanced review and possible suspicious transaction reporting.
Example 3: Politically Exposed Person
A relative of a local government official opens an account and receives large deposits from contractors. The transactions are inconsistent with the declared occupation. Enhanced due diligence and close monitoring are required.
Example 4: Remittance Pattern
Several unrelated individuals send funds to the same recipient, who immediately withdraws cash. The recipient cannot explain the purpose. The pattern may indicate mule activity or layering.
Example 5: Casino Activity
A customer buys large amounts of chips with cash, plays minimally, and redeems the chips for a casino check. This may indicate laundering through gaming activity.
Example 6: Virtual Asset Conversion
A customer receives funds from multiple accounts, buys virtual assets, and transfers them to external wallets associated with high-risk activity. This requires review and possible reporting.
XXXVI. AML Training Policy
A covered person should adopt a written AML training policy. The policy should address:
- Objective of training;
- Scope of covered personnel;
- Training frequency;
- Role-based training requirements;
- Mandatory completion;
- Assessment standards;
- Remedial training;
- Documentation;
- Trainer qualifications;
- Board reporting;
- Updates after legal or regulatory changes;
- Disciplinary consequences for non-completion.
The policy should be approved by senior management or the board, depending on the institution’s governance structure.
XXXVII. AML Training and Employee Accountability
Training should explain that AML compliance is part of employee responsibility. Institutions may impose disciplinary measures for:
- Failure to follow CDD procedures;
- Ignoring red flags;
- Failure to escalate suspicious activity;
- Unauthorized disclosure;
- Falsification of customer records;
- Circumvention of controls;
- Assisting customers in avoiding reporting;
- Failure to complete mandatory training.
Employee accountability helps reinforce the seriousness of AML obligations.
XXXVIII. Regulatory Examination Readiness
During regulatory examinations, authorities may review the institution’s AML training program. The institution should be prepared to provide:
- AML training policy;
- Training calendar;
- Training materials;
- Attendance records;
- Assessment results;
- Board reports;
- Remedial training records;
- Evidence of training updates;
- Role-based training matrix;
- Proof that high-risk employees received specialized training.
A well-documented training program can demonstrate a culture of compliance and mitigate regulatory concerns.
XXXIX. Best Practices
Best practices for AML compliance training in the Philippines include:
- Make training Philippine-specific;
- Use role-based modules;
- Include real examples and case studies;
- Update training after regulatory changes;
- Train the board and senior management;
- Test employee understanding;
- Track completion and assessment results;
- Require remedial training where needed;
- Include terrorist financing and sanctions;
- Include data privacy and confidentiality;
- Tailor training to the institution’s risk assessment;
- Use audit findings to improve content;
- Train agents and outsourced personnel where relevant;
- Keep detailed records;
- Promote a speak-up and escalation culture.
XL. Conclusion
Anti-money laundering compliance training in the Philippines is a legal necessity and a practical safeguard. It operationalizes the AMLA, AMLC regulations, and supervisory expectations by ensuring that personnel know how to identify customers, understand beneficial ownership, detect suspicious activity, file or escalate required reports, preserve confidentiality, and protect the institution from misuse.
The most effective AML training programs are continuous, role-based, documented, tested, and tailored to the risks of the institution. They do not merely recite the law; they teach personnel how money laundering actually occurs in Philippine banking, remittance, securities, insurance, casino, real estate, virtual asset, and other covered sectors.
A covered person that invests in meaningful AML training strengthens its legal compliance, protects its reputation, supports national financial integrity, and contributes to the broader fight against crime, corruption, terrorism, and illicit financial flows.