You are on page 1of 1

-----los----------HCL Loan Origination System embodies an enterprise approach to retail loans orig ination.

It supports end-to-end automation of retail loan application processing from lead generation to closing and disbursal readiness. The strong underlying Service Oriented Architecture platform enables it to be de ployed as an integrated complete solution or as modules depending on the bank s sp ecific needs to facilitate a best of breed approach. Organized into logical functional modules reflecting the credit origination proc ess, it brings together front office sales personnel, back office credit process ing officers, verification vendors and closing/operations users together in a se amlessly integrated and automated environment. HCL Loan Origination System is a new generation system designed to provide maxim um business flexibility, comprehensive credit risk management capabilities and r ules based credit processing to help you focus on enhancing your lending busines s, while streamlining your processes to achieve better processing turn-around ti mes, higher customer satisfaction and effective credit risk control by business users. -----------------------nti-money laundering (AML) software is a type of computer program used by financ ial institutions to analyze customer data and detect suspicious transactions. Anti-laundering systems filter customer data, classify it according to level of suspicion and inspect it for anomalies. Such anomalies would include any sudden and substantial increase in funds or a large withdrawal. In both the United Stat es and Canada, all transactions of $10,000 or greater must be reported. Smaller transactions that meet certain criteria may be also be flagged as suspic ious. For example, a person who wants to avoid detection LEARN MORE Financial Security Resources Bank Secrecy Act compliance will sometimes deposit a large sum as multiple smaller sums within a brief perio d of time. That practice, known as "structuring," will also lead to flagged tran sactions. The software flags names that have been blacklisted and transactions i nvolving countries that are thought to be hostile to the host nation. Once the s oftware has mined data and flagged suspect transactions, it generates a report. A human will investigate and evaluate flagged transactions. Often, when a flag i s investigated, the customer involved can explain the transaction and the flag i s dismissed. For example, a customer whose banking typically consists of regular weekly paycheck deposits and smaller withdrawals may suddenly deposit an unusua lly large sum of money. That transaction will be flagged. Upon examination, howe ver, the deposit may turn out to be from the sale of a car or other property.

You might also like