Counterparty monitoring

Automatic ongoing monitoring and scheduled AML/CFT screenings based on counterparty risk levels

Introduction

Counterparty monitoring enables automatic ongoing surveillance of your counterparties through scheduled name screenings based on their assigned risk levels. Financial sector professionals must comply with Anti-Money Laundering (AML) and Countering the Financing of Terrorism (CFT) obligations, which include conducting ongoing monitoring such as name screening against official sanctions lists.

While LYNKS provides manual KYC screening capabilities, counterparty monitoring automates this process by conducting regular screenings at intervals determined by each counterparty's risk classification. This ensures that potential risks are identified promptly and appropriate measures can be taken in a timely manner, reducing the manual burden on compliance teams while maintaining regulatory compliance.



Prerequisites

Counterparty monitoring requires the KYC screening feature to be enabled for your tenant, and counterparties must have risk levels assigned before monitoring rules can apply to them.

Permissions

PermissionDescription
TENANT_SETTINGS_READView counterparty monitoring configuration and rules
TENANT_SETTINGS_WRITECreate, edit, enable, and disable monitoring rules

Feature flags

📘

Feature flag required

Counterparty monitoring requires the KYC_MONITORING tenant flag to be enabled. Contact [email protected] to enable this feature for your tenant.

The following related feature flags may also be relevant:

Feature FlagDescription
KYC_MONITORINGEnables the counterparty monitoring functionality
KYC_SCREENINGEnables KYC name screening capabilities (required for monitoring)
KYC_RISKEnables risk level assignment for counterparties


Counterparty monitoring overview

Counterparty monitoring allows administrators to define specific monitoring rules for each risk level. The system automatically screens counterparties at configured intervals, creating or updating screening cases without manual intervention.

Counterparty monitoring configuration interface

Key components

The counterparty monitoring configuration consists of:

  • Risk level rules - Define screening frequency for each risk classification (high, medium, low, unknown)
  • Recurrence settings - Specify how often counterparties of each risk level are screened
  • Monitoring scheduler - System scheduler that runs daily to identify counterparties due for screening
  • Automatic case creation - Primary screening cases are created automatically when a counterparty has no linked screening matching their name


Accessing counterparty monitoring

Counterparty monitoring is configured within Tenant Settings, accessible to administrators with the appropriate permissions.

Navigation

To access counterparty monitoring:

  1. Navigate to Tenant Settings in the main menu
  2. Select Counterparty monitoring from the settings menu
  3. The interface displays monitoring rules for each risk level
📘

Location change

Counterparty monitoring was previously located under "KYC Control" and was moved to Tenant Settings in version 5.4. The permissions required changed from KYC-specific rights to TENANT_SETTINGS_READ and TENANT_SETTINGS_WRITE.



Risk level assignment

Counterparties can be assigned one of four risk levels, which determine their monitoring frequency. Risk levels support AML/CFT compliance by enabling differentiated treatment based on assessed risk.

Risk level categories

Risk LevelDescriptionTypical Use
HighCounterparties with elevated risk indicatorsPEP matches, sanctions concerns, high-risk jurisdictions
MediumCounterparties with moderate risk factorsStandard business relationships with some risk indicators
LowCounterparties with minimal risk factorsEstablished, low-risk business relationships
UnknownCounterparties without an assigned risk levelNew counterparties pending risk assessment

Risk levels are assigned through the counterparty details page in the KYC risk section. Users with KYC_RISK_LOG_WRITE permission can update risk levels and provide supporting evidence.

📘

Risk level feature

Risk level assignment requires the KYC_RISK tenant flag to be enabled. When enabled, the risk level column appears on the counterparties list and a KYC risk section displays on counterparty detail pages.



Configuring monitoring rules

Each risk level can have its own monitoring recurrence configured, allowing organizations to apply more frequent screening to higher-risk counterparties.

Enabling monitoring for a risk level

To enable monitoring for a specific risk level:

  1. Navigate to Tenant Settings > Counterparty monitoring
  2. Locate the risk level you want to configure
  3. Click the toggle to enable monitoring for that risk level
  4. Set the recurrence interval (frequency of screening)
  5. Save the configuration

Enabling monitoring recurrence for a risk level

Monitoring frequency settings

Configure how often counterparties at each risk level are automatically screened:

Risk LevelRecommended FrequencyRationale
HighMonthly or quarterlyFrequent monitoring for elevated risk
MediumQuarterly or semi-annuallyRegular monitoring for moderate risk
LowAnnuallyPeriodic monitoring for established relationships
UnknownQuarterlyRegular checks until proper risk assessment completed

The actual frequency settings depend on your organization's risk appetite, regulatory requirements, and internal compliance policies.



Monitoring workflows per risk level

The monitoring system executes different workflows based on counterparty status and screening state.

Automatic screening workflow

When the monitoring scheduler runs, the following logic applies:

Counterparty StatusLinked ScreeningsMonitoring Action
ActiveYes, in "Review completed" statusRe-screen all linked screenings
ActiveYes, in "Pending review" statusSkip (existing reviews must be completed first)
ActiveNo linked screening matching nameCreate primary screening using counterparty details
PendingAnySkip (only active counterparties are monitored)
DeactivatedAnySkip (only active counterparties are monitored)
RejectedAnySkip (only active counterparties are monitored)

Screening data used

When creating a primary screening for a counterparty, the system uses different data based on counterparty type:

Counterparty TypeScreening Data
IndividualFirst name, last name, gender, date of birth
OrganisationCompany name


Scheduled monitoring execution

The monitoring scheduler operates automatically to identify and screen counterparties due for monitoring.

Scheduler operation

The monitoring scheduler:

  1. Runs once per day at a configured time
  2. Checks all active counterparties against their risk level monitoring rules
  3. Identifies counterparties due for screening based on their last monitored date
  4. Places identified counterparties in a processing queue
  5. Processes counterparties one by one, creating or updating screening cases
  6. Updates the last_monitored_on timestamp after successful screening

Processing logic

For each counterparty in the queue:

  1. Check if counterparty status is Active (skip if Pending, Deactivated, or Rejected)
  2. Check if linked screenings exist in "Review completed" status
  3. If yes, re-screen those cases
  4. If no linked screening matches the counterparty name, create a primary screening
  5. Skip any screenings in "Pending review" status
  6. Update the counterparty's last monitored timestamp
📘

Queue processing

A single queue processes counterparties from all tenants. After all counterparties are checked, the system waits for the next scheduled cycle.



Alert notifications and escalation

When monitoring screenings produce results (hits), the compliance team is alerted through LYNKS notification system.

Notification triggers

Monitoring-related notifications are sent when:

  • A scheduled screening produces new results requiring review
  • A primary screening case is automatically created
  • Screening results include potential matches against sanctions lists or PEP databases

Escalation workflow

  1. Screening executed - System runs automatic screening based on monitoring rules
  2. Results received - Screening provider returns results (matches or no matches)
  3. Case updated - Results are stored in the screening case
  4. Notification sent - Compliance users receive notification if results require attention
  5. Manual review - Compliance officers review and resolve screening results

Configure notification preferences to ensure the appropriate team members receive alerts for KYC screening events. See Notifications - Configure notification preferences and channels for configuration details.



Audit trail

All counterparty monitoring activities are tracked in the audit log for compliance and review purposes.

Tracked events

The audit log records:

  • Monitoring rule changes (enable, disable, frequency updates)
  • Scheduled screening executions
  • Primary screening case creation
  • Re-screening of existing cases
  • Last monitored timestamp updates

Access the audit log from the counterparty monitoring page to review historical monitoring activity and configuration changes.



Best practices

Follow these recommendations for effective counterparty monitoring:

  • Assign risk levels promptly - Ensure all counterparties have appropriate risk levels assigned to benefit from automated monitoring
  • Align frequency with policy - Configure monitoring frequencies that match your organization's AML/CFT policies and regulatory requirements
  • Review pending screenings - Regularly check and resolve screening results in "Pending review" status to ensure monitoring can continue
  • Monitor unknown risk levels - Configure monitoring for counterparties with unknown risk levels to ensure no entities slip through without assessment
  • Document rationale - When adjusting risk levels or monitoring frequencies, document the reasoning in the risk assessment log
  • Coordinate with compliance - Work with your compliance team to establish appropriate monitoring thresholds and escalation procedures


Related documentation

Explore related sections for more information:



Support

For assistance with counterparty monitoring configuration or questions about compliance workflows, contact [email protected].