×

Proprietary risk management clearinghouse

  • US 8,209,246 B2
  • Filed: 06/18/2003
  • Issued: 06/26/2012
  • Est. Priority Date: 03/20/2001
  • Status: Active Grant
First Claim
Patent Images

1. A computer system implemented method for managing regulatory and reputational risk, the method comprising:

  • receiving into a computer system informational artifacts with content related to at least one of;

    reputational risk, regulatory risk and legal risk transaction including requests involving unaccustomed foreign account activity, requests for secrecy or exceptions to Bank Secrecy Act requirements, requests for routing through a secrecy jurisdiction and unusual fund or transaction activity;

    defining within the computer system one or more risk variables generally related to one or more financial transactions;

    receiving into the computer system proprietary data descriptive of a particular financial;

    identifying by the computer system one or more risk variables with the received proprietary data;

    assigning at least one category numerical value to the received proprietary data, wherein the category numerical value is a weight assigned according to a category of the received proprietary data;

    associating by the computer system at least one informational artifact with content related to at least one of;

    reputational risk, regulatory risk and legal risk, with the risk variables identified;

    generating a numerical weighted value, wherein the numerical weighted value is a rating of risk experienced by the risk variable associated with at least one informational artifact with content related to at least one of;

    reputational risk, regulatory risk and legal risk;

    calculating a risk quotient by multiplying the generated numerical weighting value with the category numerical value;

    updating by the computer system the association of the content based on receiving periodic supplemental data associated with reputational risk, regulatory risk and legal risk informational artifacts;

    detecting potential violations of law and addressing suitability of the particular financial transaction by creating structured historical data relating to the particular financial transaction based on the calculated risk quotient; and

    generating by the computer system a report based on the structured historical data for use within a predefined organization and comprising a description of the informational artifacts associated with the risk variables identified.

View all claims
  • 8 Assignments
Timeline View
Assignment View
    ×
    ×