Across
- 1. Overtime, allowance and commission can be counted as income for income computation.
- 3. All outstanding debt repayment divided by Income after statutory obligation is called .
- 6. John as a banker discloses information to the son of the account holder without consent. What Act did John violate?
- 9. CCRIS is owned and managed by ______________. On the other hand, CTOS/Credit Bureau Malaysia/Experian are credit reporting agencies registered by the Ministry of Finance under the Credit Reporting Agencies Act 2010.
- 11. Data _________principle in PDPA states that a data user shall take reasonable steps to ensure that the personal data is accurate, complete, not misleading and kept up-to-date by having regard to the purpose, including any directly related purpose, for which the personal data was collected and further processed.
- 12. Which guideline serves to protect individuals' interests so that they can borrow within their capacity ?
- 13. For financing, the tenure of financing shall not exceed 9 years
- 16. __________ risk is the potential loss arising from a bank borrower or counterparty failing to meet its obligations in accordance with the agreed terms.
- 17. Customer X's Savings Account has many suspicious transactions with debits and credits and the account is zerorized at day end. What is the stage of the potential illegal activity committed by customer?
- 18. What is the process of identifying and addresses verification of all customer and clients by the bank.
- 19. _________ is an organisation that establish international standards on the risk of a country base on AML/CFT Framework
Down
- 2. What type of malicious software designed to block access to a computer system until a sum of money is paid ?
- 4. For any offer or provision of gift(s) and/or entertainment of an estimated value more than RM350 in aggregate per person/item, written approval has to be obtained from __________.
- 5. CCRIS only includes specified financing and __________ information from participating financial institutions. Financial institutions and credit reporting agencies may collect more information about borrowers from sources other than CCRIS.
- 6. Hacker sends URL links via email in hope the staff would click on it. If the staff click it, it will bring the staff to an online portal which look similar to the actual website to trick the staff login and enter password.This is call __________ email.
- 7. __________ is the practice of protecting computers, servers, mobile devices, electronic systems, networks, and data from malicious cyber attacks.
- 8. The final stage of money laundering, making illegal fund appears legal is called _____________.
- 10. For financing, the tenure of financing shall not exceed 35 years
- 14. Customer debt obligation and repayment history can be obtained via .
- 15. ___________is required from data subject to disclose their personal data