Across
- 1. To look for privacy information, we can go to RBC Home Page and Click on P_____y.
- 2. What do we use to help create a safer and more secure online marketplace.
- 4. When you leave your computer, you should L___K you screen.
- 6. If there is a bomb threat/Robbery/Kidnap/Hostage situation where would you go to find the information.
- 8. Terrorist financing is the process that criminals use to fund terrorism.
- 9. If we had to evacuate the building where is our secondary location.
Down
- 1. This is the process by which criminals place illicit funds into the financial system. (One of three layers of Anti-Money Laundering)
- 3. Money laundering is the process by which criminals conceal and convert the proceeds of crime.
- 5. In the final stage of AML, the launderer moves the money back into the financial system in such a way that it appears to be legitimate funds.
- 7. This is the launderer creates a complex web of transactions to disguise the audit trail and source of ownership of the funds. (One of three layers of Anti-Money Laundering)
