Covered and Suspicious Transactions Under Philippine Anti-Money Laundering Law

I. Introduction

The Philippine anti-money laundering framework is built on the idea that financial crime is best detected through the observation, recording, and reporting of transactions that reveal either unusual value or suspicious circumstances. Two of the most important reporting concepts under Philippine anti-money laundering law are covered transactions and suspicious transactions.

These concepts appear primarily under the Anti-Money Laundering Act of 2001, as amended, commonly known as the AMLA, together with its implementing rules, regulations, and issuances of the Anti-Money Laundering Council or AMLC. They are central to the duties of banks, financial institutions, casinos, real estate participants, lawyers, accountants, company service providers, and other covered persons.

A covered transaction is generally reportable because it reaches a statutory monetary threshold. A suspicious transaction, by contrast, is reportable because of its nature, circumstances, apparent purpose, or connection to possible unlawful activity, regardless of amount.

Both types of transactions are intended to help the State detect, investigate, and prevent money laundering, terrorism financing, proliferation financing, fraud, corruption, drug trafficking, cybercrime, tax-related predicate offenses, kidnapping, human trafficking, securities fraud, and other serious unlawful activities.


II. Legal Framework

The principal Philippine law is Republic Act No. 9160, the Anti-Money Laundering Act of 2001, as amended by later statutes including:

  1. Republic Act No. 9194
  2. Republic Act No. 10167
  3. Republic Act No. 10365
  4. Republic Act No. 10927
  5. Republic Act No. 11521

These amendments expanded the list of covered persons, broadened the scope of unlawful activities, strengthened the authority of the AMLC, and aligned Philippine law with international standards, particularly those of the Financial Action Task Force or FATF.

The AMLA is supplemented by:

  • The Revised Implementing Rules and Regulations;
  • AMLC regulatory issuances;
  • Bangko Sentral ng Pilipinas regulations for supervised financial institutions;
  • Insurance Commission rules for insurance entities;
  • Securities and Exchange Commission rules for securities market participants and covered company service providers;
  • Philippine Amusement and Gaming Corporation and other casino-related regulations;
  • Rules of court on bank inquiry, freeze orders, civil forfeiture, and prosecution.

III. Purpose of Transaction Reporting

The reporting of covered and suspicious transactions serves several purposes.

First, it allows the AMLC to build financial intelligence. Suspicious patterns may not be obvious from a single report, but repeated reports from different institutions can reveal a wider network.

Second, it deters criminals from using the Philippine financial system. Mandatory reporting increases the risk that illicit funds will be detected.

Third, it supports investigation and prosecution. Reports may lead to bank inquiry orders, freeze orders, civil forfeiture, criminal cases, or cooperation with foreign financial intelligence units.

Fourth, it helps covered persons manage risk. Reporting obligations are part of broader anti-money laundering and counter-terrorism financing compliance programs.

The law does not expect covered persons to prove that a crime has occurred before filing a report. Their duty is to identify transactions that meet the statutory or regulatory criteria and report them to the AMLC within the required period.


IV. Covered Persons

Before discussing covered and suspicious transactions, it is necessary to understand who must report them.

Under the AMLA, covered persons include a broad range of financial and non-financial businesses and professions. These generally include the following.

A. Banks and Financial Institutions

These include:

  • Universal banks;
  • Commercial banks;
  • Thrift banks;
  • Rural banks;
  • Cooperative banks;
  • Islamic banks;
  • Offshore banking units;
  • Quasi-banks;
  • Trust entities;
  • Non-stock savings and loan associations;
  • Foreign exchange dealers;
  • Money changers;
  • remittance and transfer companies;
  • electronic money issuers;
  • payment system operators and participants;
  • pawnshops;
  • financing companies;
  • lending companies;
  • other institutions supervised or regulated by the Bangko Sentral ng Pilipinas.

B. Insurance Entities

These include:

  • Insurance companies;
  • pre-need companies;
  • insurance brokers;
  • insurance agents;
  • mutual benefit associations;
  • other entities supervised by the Insurance Commission.

C. Securities and Investment-Related Entities

These include:

  • Securities dealers;
  • brokers;
  • salesmen;
  • investment houses;
  • investment agents;
  • mutual fund companies;
  • investment advisers;
  • asset managers;
  • securities custodians;
  • transfer agents;
  • other entities supervised by the Securities and Exchange Commission.

D. Casinos

Casinos became covered persons through later amendments to the AMLA. This includes land-based, ship-based, internet-based, and other forms of casinos authorized by the appropriate regulator.

Casino reporting is especially important because casinos may be used to convert cash into chips, chips into checks, or gambling credits into apparently legitimate winnings.

E. Real Estate Developers and Brokers

Real estate developers and real estate brokers are covered persons for transactions involving real estate purchases or sales above the statutory threshold.

Real estate is a common laundering vehicle because it can absorb large values, appreciate over time, disguise beneficial ownership, and be held through corporations, nominees, trusts, or layered structures.

F. Jewelry Dealers, Dealers in Precious Metals, and Dealers in Precious Stones

Dealers in precious metals and stones are covered because these assets are portable, high-value, and often easily converted into cash.

G. Lawyers, Accountants, and Other Professionals in Certain Activities

Lawyers, accountants, and other professionals are covered persons when they provide specified services involving the management or movement of client assets, creation or management of juridical persons, or similar activities.

However, the AMLA recognizes limits related to privileged communication and legal professional privilege. Lawyers are not required to report information obtained in circumstances protected by attorney-client privilege, particularly where the information relates to legal advice or legal representation. The privilege does not protect participation in money laundering or the use of legal services to commit a crime.

H. Company Service Providers

Persons who provide services such as acting as formation agents, nominee directors, nominee shareholders, corporate secretaries, registered agents, or similar functions may be covered, especially where they help create or manage corporations, partnerships, trusts, or other legal arrangements.


V. Covered Transactions

A. General Meaning

A covered transaction is a transaction in cash or other equivalent monetary instrument involving a total amount above the threshold fixed by law within a specified period.

The most familiar general rule is that a transaction is covered if it involves an amount in excess of Five Hundred Thousand Pesos, or its equivalent in foreign currency, within one banking day, for covered persons generally.

For casinos, the threshold is higher: a single casino cash transaction involving an amount in excess of Five Million Pesos, or its equivalent in any other currency, is generally treated as a covered transaction.

For real estate developers and brokers, a transaction involving real estate purchase or sale in excess of the statutory threshold, commonly understood as Seven Million Five Hundred Thousand Pesos, is reportable under the AMLA framework.

The key idea is that a covered transaction is based primarily on amount, even if there is no obvious suspicious circumstance.

B. Elements of a Covered Transaction

A covered transaction generally involves:

  1. A transaction by, with, or through a covered person;
  2. A value exceeding the statutory threshold;
  3. The threshold is met within the relevant period;
  4. The transaction is not exempted by law or regulation;
  5. The covered person is required to report it to the AMLC.

A covered transaction does not require proof of unlawful activity. A large legitimate transaction may still be reportable.

C. “Transaction” Broadly Understood

The term transaction is understood broadly. It may include:

  • Deposit;
  • withdrawal;
  • transfer;
  • remittance;
  • currency exchange;
  • payment;
  • purchase;
  • sale;
  • loan release;
  • loan payment;
  • investment;
  • insurance premium payment;
  • insurance claim;
  • securities trade;
  • purchase of casino chips;
  • redemption of casino chips;
  • cash-in or cash-out activity;
  • purchase or sale of real property;
  • acquisition of precious metals or stones;
  • corporate service arrangement;
  • trust or fiduciary arrangement.

The form of the transaction is less important than its substance.

D. Threshold-Based Reporting

Covered transaction reporting is threshold-based. The reporting obligation arises because the transaction exceeds a set amount.

For example, a customer depositing ₱700,000 in cash in one banking day may trigger a covered transaction report, even if the customer is a legitimate business owner and the source of funds appears lawful.

Likewise, a casino cash transaction exceeding the applicable casino threshold may be reportable even if the customer is a regular patron.

E. Aggregation

Covered persons must be alert to transactions that are broken down into smaller amounts to avoid reporting thresholds. This practice is often called structuring or smurfing.

For example, instead of depositing ₱600,000 at once, a person may deposit ₱200,000 in the morning, ₱200,000 at noon, and ₱200,000 in the afternoon. If these transactions are connected and collectively exceed the reporting threshold within the relevant period, the covered person should treat them according to AMLA reporting principles.

Structuring may also make the transaction suspicious.

F. Covered Transaction Report

A report filed for a covered transaction is commonly called a Covered Transaction Report or CTR.

A CTR generally contains information about:

  • The customer;
  • the account or transaction;
  • transaction date;
  • amount;
  • currency;
  • nature of transaction;
  • parties involved;
  • beneficial owner, where applicable;
  • covered person filing the report;
  • other relevant details required by the AMLC.

The report is submitted to the AMLC through the prescribed reporting system.

G. Reporting Period

Covered persons are generally required to report covered transactions within the period prescribed by law and regulation, commonly within five working days from occurrence, unless a different period applies under AMLC rules or special circumstances.

The AMLC may prescribe specific procedures, forms, electronic systems, and deadlines.


VI. Suspicious Transactions

A. General Meaning

A suspicious transaction is a transaction, regardless of amount, where circumstances indicate that it may be related to unlawful activity, money laundering, terrorism financing, or an attempt to evade reporting or identification requirements.

Unlike covered transactions, suspicious transactions do not depend on a monetary threshold. Even a small transaction can be suspicious.

The legal focus is not merely on size but on the presence of red flags.

B. Statutory Indicators of Suspicion

Under Philippine AML law, a transaction may be suspicious when any of the following circumstances exist:

  1. There is no underlying legal or trade obligation, purpose, or economic justification;
  2. The client is not properly identified;
  3. The amount involved is not commensurate with the business or financial capacity of the client;
  4. Taking into account all known circumstances, the transaction may be perceived to deviate from the client’s profile or past transactions;
  5. The transaction is structured to avoid being reported as a covered transaction;
  6. The transaction is related to an unlawful activity or money laundering offense that is about to be, is being, or has been committed;
  7. The transaction is similar or analogous to the foregoing circumstances.

These indicators are deliberately broad. They require covered persons to exercise judgment based on customer due diligence, transaction monitoring, and knowledge of the customer’s profile.

C. Suspicious Transaction Report

A report filed for a suspicious transaction is commonly called a Suspicious Transaction Report or STR.

An STR is more judgment-based than a CTR. It should describe the facts, circumstances, and reasons why the transaction is considered suspicious.

An STR may involve:

  • A single transaction;
  • a series of linked transactions;
  • an attempted transaction;
  • an account opening attempt;
  • a refused transaction;
  • unusual activity in a dormant account;
  • sudden activity inconsistent with the customer profile;
  • unusual third-party involvement;
  • use of nominees;
  • shell companies;
  • unexplained source of funds;
  • layering activity;
  • possible links to unlawful activity.

D. Suspicion Is Not Proof

A covered person does not need to prove that money laundering occurred before filing an STR. The threshold is suspicion, not certainty.

The filing of an STR is a preventive and intelligence-gathering measure. It alerts the AMLC to possible risk.

Because covered persons are not courts or prosecutors, they are not required to establish guilt. Their obligation is to report where the legal and regulatory indicators of suspicion are present.

E. Attempted Transactions

Attempted transactions may also be suspicious.

For example, a person may attempt to open an account using questionable identification documents, refuse to disclose beneficial ownership, or abandon a transaction after being asked for source-of-funds documents.

Even if no money actually changes hands, the attempted activity may still be reportable if it reveals suspicious circumstances.


VII. Difference Between Covered and Suspicious Transactions

Covered and suspicious transactions are related but distinct.

Point of Comparison Covered Transaction Suspicious Transaction
Basis Amount threshold Suspicious circumstances
Amount required Yes, must exceed threshold No minimum amount
Need for suspicion Not necessary Necessary
Example ₱700,000 cash deposit in one banking day ₱50,000 deposit inconsistent with customer profile
Report Covered Transaction Report Suspicious Transaction Report
Nature Mostly objective Judgment-based
Legal purpose Monitor high-value transactions Detect possible unlawful activity

A transaction may be both covered and suspicious. For example, a ₱1,000,000 deposit may be reportable as a covered transaction because of amount and also reportable as suspicious if the funds are inconsistent with the customer’s profile or appear structured.


VIII. Unlawful Activities and Predicate Offenses

A suspicious transaction often becomes significant because it may be connected to an unlawful activity under the AMLA.

Money laundering is not limited to drug money or proceeds of corruption. Philippine law recognizes a wide list of predicate offenses.

These include, among others:

  • Kidnapping for ransom;
  • drug offenses;
  • graft and corrupt practices;
  • plunder;
  • robbery and extortion;
  • swindling or estafa;
  • qualified theft;
  • smuggling;
  • piracy;
  • destructive arson;
  • murder;
  • terrorism and terrorism financing;
  • securities fraud;
  • human trafficking;
  • child exploitation offenses;
  • cybercrime-related offenses;
  • financing of proliferation of weapons of mass destruction;
  • violations of the Electronic Commerce Act;
  • violations involving dangerous drugs;
  • environmental crimes;
  • tax crimes in certain circumstances;
  • violations of the Strategic Trade Management Act;
  • violations involving fraud, forgery, malversation, and other listed offenses.

The precise statutory list has expanded over time. For compliance purposes, covered persons should treat predicate offense identification as dynamic and tied to the AMLA as amended and AMLC issuances.


IX. Money Laundering Offense

Money laundering is committed when a person, knowing that a monetary instrument or property represents, involves, or relates to the proceeds of unlawful activity, performs certain acts such as:

  • Transacting with it;
  • converting it;
  • transferring it;
  • disposing of it;
  • moving it;
  • acquiring it;
  • possessing it;
  • using it;
  • concealing or disguising its true nature, source, location, disposition, movement, ownership, or rights;
  • aiding, abetting, assisting, or counseling commission of the offense;
  • failing to report covered or suspicious transactions when required by law.

The AMLA also penalizes failure by covered persons to report covered and suspicious transactions.


X. Customer Due Diligence

Covered and suspicious transaction reporting cannot function without customer due diligence, often called CDD or know-your-customer procedures.

CDD generally requires covered persons to:

  1. Identify the customer;
  2. verify the customer’s identity using reliable documents, data, or information;
  3. identify the beneficial owner;
  4. understand the purpose and intended nature of the business relationship;
  5. conduct ongoing monitoring;
  6. update customer information;
  7. apply enhanced due diligence to higher-risk customers.

The purpose of CDD is to establish a customer profile. Without a customer profile, it is difficult to determine whether a transaction is unusual or suspicious.


XI. Beneficial Ownership

A critical part of Philippine AML compliance is determining the beneficial owner.

A beneficial owner is generally the natural person who ultimately owns or controls a customer, account, transaction, corporation, partnership, trust, or legal arrangement.

The use of corporations, nominees, trusts, agents, or intermediaries does not remove the obligation to identify the person who ultimately controls or benefits from the transaction.

Red flags involving beneficial ownership include:

  • refusal to identify beneficial owners;
  • complex ownership structure without business justification;
  • use of shell companies;
  • use of nominees with no apparent commercial reason;
  • foreign entities in secrecy jurisdictions;
  • frequent changes in ownership;
  • use of multiple corporate layers;
  • mismatch between declared business and transaction size.

XII. Enhanced Due Diligence

Enhanced due diligence is required for higher-risk relationships and transactions.

Examples include:

  • Politically exposed persons;
  • foreign customers from high-risk jurisdictions;
  • private banking clients;
  • cash-intensive businesses;
  • non-face-to-face relationships;
  • complex corporate structures;
  • customers dealing in virtual assets;
  • customers with negative news;
  • customers linked to sanctioned individuals or entities;
  • transactions involving high-risk countries;
  • unusual large-value transactions.

Enhanced due diligence may require:

  • senior management approval;
  • source-of-funds verification;
  • source-of-wealth verification;
  • more frequent monitoring;
  • additional documentation;
  • adverse media screening;
  • deeper beneficial ownership review;
  • closer scrutiny of transaction purpose.

A transaction may become suspicious if the customer cannot satisfactorily explain or document it.


XIII. Politically Exposed Persons

A politically exposed person, or PEP, is someone who is or has been entrusted with a prominent public function, as well as certain family members and close associates.

PEPs present higher money laundering risk because of possible exposure to bribery, corruption, misuse of public funds, influence peddling, and concealment of beneficial ownership.

A transaction involving a PEP is not automatically suspicious. However, covered persons must apply enhanced due diligence and closely examine whether the transaction is consistent with the PEP’s lawful income, declared assets, business profile, and known public position.

Red flags include:

  • unexplained wealth;
  • transactions through relatives or close associates;
  • use of shell companies;
  • sudden acquisition of real estate;
  • use of cash inconsistent with declared income;
  • payments from government contractors;
  • funds passing through lawyers, accountants, or consultants without clear purpose;
  • transactions near elections, procurement awards, or major public contracts.

XIV. Common Red Flags

A. Customer Identification Red Flags

Suspicion may arise where the customer:

  • refuses to provide identification;
  • provides inconsistent personal information;
  • uses fake or altered documents;
  • gives unverifiable addresses;
  • avoids face-to-face contact;
  • appears to act for another person but refuses to identify the principal;
  • changes information frequently;
  • cannot explain the nature of business;
  • uses multiple accounts without clear reason;
  • uses third parties to conduct transactions.

B. Transaction Pattern Red Flags

Suspicion may arise where there are:

  • frequent deposits just below reporting thresholds;
  • multiple small deposits followed by one large transfer;
  • sudden activity in a dormant account;
  • pass-through movement of funds;
  • funds transferred immediately after receipt;
  • transactions inconsistent with known business activity;
  • circular movement of funds;
  • repetitive cash deposits from unrelated third parties;
  • unexplained international transfers;
  • rapid movement between related companies.

C. Cash Red Flags

Cash remains a high-risk feature. Suspicion may arise from:

  • unusually large cash deposits;
  • cash transactions inconsistent with business type;
  • deposits using old or damaged bills;
  • use of multiple branches;
  • frequent cash withdrawals after wire transfers;
  • exchange of small bills for large bills;
  • use of cash where normal commercial practice would involve bank transfer;
  • refusal to explain source of cash.

D. Corporate Red Flags

For corporate customers, red flags include:

  • no visible business operations;
  • no employees or office;
  • newly incorporated company with large transactions;
  • nominee shareholders or directors;
  • complex structure without business reason;
  • transactions unrelated to stated business;
  • frequent changes in authorized signatories;
  • common address used by many entities;
  • use of corporate vehicles to hold personal assets.

E. Real Estate Red Flags

Real estate-related suspicious indicators include:

  • cash purchase of high-value property;
  • buyer has no apparent financial capacity;
  • property purchased through a company with unclear beneficial ownership;
  • repeated buying and selling at unusual prices;
  • undervaluation or overvaluation;
  • use of multiple buyers;
  • immediate resale with unexplained gain or loss;
  • use of third-party payors;
  • foreign buyer using local nominees;
  • payment structure designed to avoid reporting.

F. Casino Red Flags

Casino-related red flags include:

  • purchase of chips with minimal gaming activity;
  • redemption of chips shortly after purchase;
  • use of third parties to buy or redeem chips;
  • structuring casino transactions;
  • funds from high-risk jurisdictions;
  • multiple patrons apparently acting together;
  • request for casino checks after little or no gambling;
  • unusual use of junket operators;
  • rapid movement of funds through casino accounts.

G. Securities Red Flags

In securities transactions, red flags include:

  • trading inconsistent with customer profile;
  • transactions with no apparent investment purpose;
  • use of accounts for pass-through funds;
  • market manipulation indicators;
  • wash trades;
  • nominee trading;
  • unusual transfers of securities;
  • sudden liquidation followed by transfer abroad;
  • suspicious private placements;
  • use of securities accounts by shell companies.

H. Insurance Red Flags

Insurance-related red flags include:

  • large single-premium policy inconsistent with customer profile;
  • early policy surrender despite penalties;
  • payment by unrelated third parties;
  • frequent changes of beneficiaries;
  • assignment of policy to unrelated persons;
  • overpayment of premiums followed by refund request;
  • use of insurance products primarily as investment conduits;
  • reluctance to provide source-of-funds information.

I. Professional Service Red Flags

For lawyers, accountants, and company service providers, suspicious indicators include:

  • client requests creation of complex structures without commercial reason;
  • client refuses to identify beneficial owners;
  • funds pass through professional accounts without connection to legal services;
  • client asks professional to hold money without clear purpose;
  • client uses multiple companies in different jurisdictions;
  • transaction appears designed to obscure ownership;
  • client is unconcerned with tax, legal, or commercial consequences;
  • client insists on secrecy beyond legitimate confidentiality.

XV. Reporting Duties of Covered Persons

Covered persons must:

  1. Establish AML compliance programs;
  2. conduct customer due diligence;
  3. monitor transactions;
  4. identify covered transactions;
  5. identify suspicious transactions;
  6. file CTRs and STRs with the AMLC;
  7. keep records;
  8. train personnel;
  9. appoint compliance officers;
  10. cooperate with AMLC inquiries;
  11. comply with freeze orders and court orders;
  12. avoid tipping off customers.

The duty to report is mandatory. Failure to report may result in administrative, civil, or criminal consequences.


XVI. Timing and Manner of Reporting

Covered and suspicious transaction reports are submitted to the AMLC in the required form and manner, generally through secure electronic reporting channels.

The usual reporting period is within the legally prescribed number of working days from occurrence or from determination of suspicion, depending on the type of report and applicable rules.

For suspicious transactions, the reporting period generally begins when suspicion is formed or when the covered person has reasonable grounds to suspect.

Covered persons must not delay reporting simply because an internal investigation is ongoing, unless the applicable rules allow limited review to determine whether reporting is required.


XVII. No Tipping-Off Rule

A crucial rule under AML law is the prohibition against tipping off.

Covered persons, their directors, officers, employees, representatives, agents, consultants, and other personnel must not disclose to the customer or unauthorized persons that:

  • a covered transaction report has been filed;
  • a suspicious transaction report has been filed;
  • a transaction is under AML review;
  • the AMLC has requested information;
  • an investigation is underway;
  • a freeze order or bank inquiry may be sought.

Tipping off can compromise investigations, allow funds to be moved, and expose the covered person to liability.

Internal disclosure is allowed only on a need-to-know basis within the covered person’s compliance framework.


XVIII. Safe Harbor Protection

Philippine AML law generally provides protection to covered persons and their personnel who report covered or suspicious transactions in good faith.

This protection is important because reporting may involve sensitive customer information. The law recognizes that covered persons should not be penalized for complying with mandatory reporting obligations.

However, safe harbor does not protect bad faith reporting, malicious reporting, participation in money laundering, concealment, or deliberate misuse of the reporting system.


XIX. Confidentiality of Reports

Covered and suspicious transaction reports are confidential. They are not ordinary public records.

The AMLC uses these reports for financial intelligence, investigation, and enforcement purposes.

The confidentiality of reports protects:

  • the integrity of investigations;
  • the reporting institution;
  • the customer’s privacy;
  • law enforcement strategy;
  • cooperation with foreign financial intelligence units.

Unauthorized disclosure may lead to penalties.


XX. Record-Keeping

Covered persons must maintain records of customer identification, account files, business correspondence, and transaction documents for the period required by AML regulations.

Records should be sufficient to reconstruct individual transactions and provide evidence for investigation or prosecution.

Record-keeping applies to:

  • customer identification documents;
  • beneficial ownership information;
  • account opening forms;
  • transaction records;
  • wire transfer information;
  • source-of-funds documents;
  • due diligence reviews;
  • risk assessments;
  • CTR and STR documentation;
  • internal investigation notes;
  • compliance approvals.

Retention is especially important because money laundering investigations may occur years after the transaction.


XXI. Freezing of Assets

The AMLC may seek or issue freeze orders under applicable law and court rules, depending on the nature of the case and legal authority involved.

A freeze order prevents the movement, transfer, withdrawal, conversion, concealment, or disposition of monetary instruments or property related to unlawful activity or money laundering.

Covered persons must comply promptly with freeze orders.

A freeze order is not a final determination of guilt. It is a provisional measure designed to preserve assets while investigation or litigation proceeds.


XXII. Bank Inquiry

Philippine law generally protects bank deposits under bank secrecy laws. However, AMLA provides mechanisms by which the AMLC may inquire into or examine deposits and investments under specified conditions.

In many cases, court authorization is required. In certain serious cases, exceptions may apply depending on the predicate offense and statutory framework.

Bank inquiry is a powerful tool because money laundering often depends on the movement of funds through bank accounts. However, it must be exercised according to law, due process, and applicable judicial safeguards.


XXIII. Civil Forfeiture

The AMLC may pursue civil forfeiture of monetary instruments or property related to unlawful activity or money laundering.

Civil forfeiture is directed against the property itself, not necessarily against a person as a criminal accused. The object is to prevent offenders from enjoying the proceeds of crime.

Covered and suspicious transaction reports may provide the initial intelligence that leads to civil forfeiture proceedings.


XXIV. Criminal Liability

Failure to comply with AMLA obligations may result in sanctions.

Possible violations include:

  • money laundering;
  • failure to report covered or suspicious transactions;
  • malicious reporting;
  • breach of confidentiality;
  • tipping off;
  • failure to keep records;
  • failure to conduct proper customer due diligence;
  • obstruction or non-cooperation;
  • violation of freeze orders;
  • participation in laundering schemes.

Liability may attach to natural persons and, in appropriate cases, juridical persons through responsible directors, officers, or employees.


XXV. Administrative Sanctions

Regulators may impose administrative sanctions for AML compliance failures.

These may include:

  • monetary penalties;
  • reprimands;
  • warnings;
  • directives to improve controls;
  • suspension of officers;
  • restrictions on business activity;
  • revocation or suspension of license;
  • enhanced supervision;
  • enforcement actions;
  • compliance remediation orders.

Regulatory exposure may arise even if no money laundering conviction occurs. Weak controls, failure to report, poor monitoring, and inadequate customer due diligence may be independently sanctionable.


XXVI. Risk-Based Approach

Philippine AML compliance follows a risk-based approach.

This means covered persons must identify, assess, understand, and mitigate their money laundering and terrorism financing risks.

Not all customers and transactions carry the same risk. A low-income customer making a small domestic remittance presents a different risk from a politically exposed person moving large sums through multiple corporations.

A risk-based system generally considers:

  • customer risk;
  • product risk;
  • delivery channel risk;
  • geographic risk;
  • transaction risk;
  • institutional risk;
  • sanctions risk;
  • terrorism financing risk;
  • proliferation financing risk.

The risk-based approach allows institutions to allocate resources where risk is highest, but it does not excuse non-compliance with mandatory reporting duties.


XXVII. Relationship Between Covered Transaction Reporting and Customer Privacy

Philippine AML reporting necessarily intersects with privacy and bank secrecy.

Covered persons must handle personal information under applicable data privacy laws while complying with AMLA obligations. AML reporting is generally treated as a lawful and mandatory processing of information.

Customer privacy does not defeat AML reporting duties. However, covered persons must ensure that data is accessed, stored, transmitted, and disclosed only for lawful purposes and only to authorized persons or agencies.

The principle is not secrecy at all costs, but lawful confidentiality subject to statutory exceptions.


XXVIII. Examples

Example 1: Covered but Not Necessarily Suspicious

A long-established grocery business deposits ₱900,000 in daily sales proceeds into its bank account. The business has a history of large cash sales, complete documents, tax records, and consistent transaction patterns.

This may be a covered transaction because it exceeds the reporting threshold. It may not be suspicious if consistent with the customer profile.

Example 2: Suspicious but Not Covered

A newly opened account of a student receives several ₱80,000 deposits from unrelated persons, followed by immediate transfers to a foreign crypto-related platform.

The amount may not meet the covered transaction threshold, but the transaction may be suspicious because it is inconsistent with the customer’s profile and lacks apparent economic justification.

Example 3: Both Covered and Suspicious

A customer deposits ₱1,200,000 in cash and refuses to explain the source of funds. The customer’s declared occupation and income do not support the amount. The customer appears nervous and asks whether the bank will report the transaction.

This is likely both covered and suspicious.

Example 4: Structuring

A customer deposits ₱490,000 on Monday, ₱495,000 on Tuesday, and ₱480,000 on Wednesday, each time at different branches, despite having no business reason for repeated cash deposits.

Even if each deposit falls below the threshold, the pattern suggests structuring and may be suspicious.

Example 5: Real Estate Laundering

A corporation with no active business purchases a luxury condominium for ₱50 million. Payment is made partly by unrelated third parties. The corporation refuses to disclose beneficial owners.

This may be suspicious because of unclear beneficial ownership, third-party payments, and lack of economic justification.

Example 6: Casino Laundering

A patron buys ₱8 million worth of chips, plays minimally, then redeems most chips and requests a casino check.

This may be a covered casino transaction and suspicious because the transaction appears designed to convert cash into apparently legitimate casino proceeds.


XXIX. Common Compliance Mistakes

Covered persons commonly commit errors such as:

  • treating covered transaction reporting as a substitute for suspicious transaction monitoring;
  • assuming that below-threshold transactions are not reportable;
  • failing to aggregate related transactions;
  • relying solely on front-line staff judgment;
  • failing to document reasons for suspicion;
  • failing to identify beneficial owners;
  • applying the same due diligence to all customers;
  • ignoring adverse media;
  • failing to monitor dormant accounts;
  • neglecting attempted transactions;
  • delaying STR filing;
  • disclosing AML concerns to customers;
  • failing to update customer profiles;
  • relying on paper compliance without actual monitoring.

The most serious mistake is viewing AML compliance as a purely mechanical reporting exercise. Suspicious transaction detection requires judgment, context, and ongoing monitoring.


XXX. Covered and Suspicious Transactions in Digital Finance

Modern financial activity has expanded AML risks.

Digital banks, e-wallets, payment platforms, virtual asset service providers, online lending platforms, remittance apps, and other fintech participants must monitor transactions in a technology-driven environment.

Digital red flags include:

  • rapid cash-in and cash-out;
  • multiple accounts using same device;
  • multiple users using same identity documents;
  • mule accounts;
  • unusual login locations;
  • suspicious IP addresses;
  • repeated failed identity verification;
  • use of synthetic identities;
  • transfers to high-risk virtual asset platforms;
  • layering through multiple e-wallets;
  • accounts controlled by scam networks;
  • transactions linked to online gambling, fraud, phishing, or cybercrime.

Digital finance increases speed and convenience, but it also increases the need for automated monitoring, analytics, and timely reporting.


XXXI. Terrorism Financing and Proliferation Financing

Suspicious transaction reporting is also important in detecting terrorism financing and proliferation financing.

Terrorism financing may involve small amounts, legitimate-looking donations, charities, remittances, or informal networks. The amount may be modest, making threshold-based covered transaction reporting insufficient.

Red flags include:

  • transactions involving sanctioned persons or entities;
  • transfers to conflict zones;
  • use of charities without clear program activity;
  • donations inconsistent with donor profile;
  • multiple small transfers to high-risk areas;
  • use of students, workers, or migrants as conduits;
  • unexplained foreign funding;
  • links to extremist networks.

Proliferation financing involves funds or assets connected to weapons of mass destruction programs, restricted goods, sanctioned countries, front companies, shipping networks, or strategic trade violations.


XXXII. Internal AML Governance

A covered person should maintain an internal AML governance system with:

  • board-approved AML program;
  • senior management oversight;
  • compliance officer;
  • independent audit;
  • employee training;
  • risk assessment;
  • customer acceptance policy;
  • transaction monitoring system;
  • sanctions screening;
  • suspicious transaction escalation;
  • record-keeping procedures;
  • regulatory reporting procedures;
  • confidentiality safeguards;
  • remediation process.

An institution cannot defend itself merely by saying that suspicious activity was not noticed. Regulators expect systems capable of identifying and escalating red flags.


XXXIII. Legal and Practical Importance

Covered and suspicious transaction reporting is one of the strongest tools in the Philippine AML regime.

It allows the AMLC and law enforcement agencies to identify hidden relationships, trace proceeds of crime, locate assets, support prosecutions, and cooperate internationally.

At the same time, the system places significant responsibility on private institutions. Banks, casinos, brokers, insurers, real estate participants, lawyers, accountants, and other covered persons act as gatekeepers of the financial system.

The balance is delicate. Over-reporting without analysis can flood the system with low-quality information. Under-reporting can allow criminal proceeds to move undetected. The law expects covered persons to report accurately, promptly, and in good faith.


XXXIV. Conclusion

Under Philippine anti-money laundering law, covered transactions and suspicious transactions are distinct but complementary reporting mechanisms.

A covered transaction is primarily threshold-based. It is reportable because the amount exceeds the statutory limit. It does not require suspicion.

A suspicious transaction is circumstance-based. It is reportable regardless of amount when the facts suggest lack of lawful purpose, inconsistency with customer profile, structuring, unclear identity, possible unlawful activity, or other red flags.

Together, these reporting duties form the backbone of the Philippine AML system. They support financial intelligence, law enforcement, regulatory supervision, asset preservation, and the prevention of criminal abuse of the financial system.

Compliance requires more than filing reports. It requires a working knowledge of the customer, beneficial ownership, source of funds, transaction purpose, risk profile, red flags, confidentiality rules, and the legal consequences of non-reporting. In Philippine law, the effective detection and reporting of covered and suspicious transactions is not merely a regulatory formality; it is a statutory obligation central to protecting the integrity of the financial system.

Disclaimer: This content is not legal advice and may involve AI assistance. Information may be inaccurate.