Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Plantumlcloud
filenameActio_TMS-Typology_Processor_Context.png
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
widthfit
compressedtrue
revision8

Change notes:

  1. 2021/08/19: Changed the description of the typology expression as the configuration “file” of the typology to the typology configuration.

  2. 2021/08/19: Added a requirement for interdiction out of the typology processor.

Table of Content Zone
Table of Contents

Introduction

The foundation of the Actio Transaction Monitoring service is its ability to evaluate incoming transactions for financial crime risk through the execution of a number of conditional statements (rules) that are then combined into typologies that describe the nature of the financial crime that the system is trying to detect.

...