• The UCC for Lenders

    Overview and UCC definitionsArticle 9 secured transactions
    Perfection and attachment
    Rules of priority
    UCC forms and how they work: UCC-1, UCC-3, UCC-5, UCC-11
    Common mistakes: debtor names, collateral descriptions, filing locations
    Titled assets
    Special rules for intellectual property
    Special filing offices

  • Credit Push Fraud Compliance: Navigating the Latest ACH, RTP, and FedNow® Rule Changes and Requirements (1.8 AAP Credits)

    The mechanics of credit push fraud: How fraudsters exploit weaknesses in electronic payment systemsACH Rule Updates: New requirements designed to mitigate fraud risks, including their impact on your operations.
    RTP Rules and Compliance: Specific guidelines and best practices to protect against fraud in real-time payments
    FedNow Fraud Prevention: Explore the built-in security features and rule requirements aimed at safeguarding instant payments
    Practical Strategies: Implementing effective fraud detection and prevention measures across your payment systems

  • Alert! Proposed BSA/AML Program Rule Changes

    Statement on the Purpose of an AML/CFT Program RequirementInserting the Term “CFT” Into the Program Rules
    Defining “AML/CFT Priorities”
    “Effective, Risk-Based, and Reasonably Designed” AML/CFT Program Requirements
    Risk Assessment Process
    Identifying and Evaluating ML/TF and Other Illicit Finance Activity Risks
    Review of Reports Filed Pursuant to 31 CFR Chapter X
    Other Components of an Effective, Risk-Based, and Reasonably Designed AML/CFT Program