✦ Sanctions Compliance

Sanctions Screening for Remittance Companies 2026
OFAC, UN, EU, and HMT — Complete Compliance Guide

Every money transfer business must screen every customer and every transaction against global sanctions lists before funds move. This guide explains exactly which lists apply, how screening systems work, and what regulators expect to find in your compliance file.

⏱ 13 min read 📋 Compliance deep-dive Abhishek Agarwal 🏢 RemitSo

Sanctions screening for remittance companies is not optional — it is a legal obligation enforced by financial regulators in every major send-from jurisdiction. Every MTO must screen customers, beneficiaries, and transactions against OFAC, UN, EU, HMT, and applicable local sanctions lists before funds are released. Failure to do so carries criminal liability, licence revocation, and civil penalties that can exceed one million dollars per transaction.

Quick Answer: Sanctions Screening for MTOs
  • What it is: The automated process of checking customers, beneficiaries, and transactions against government-maintained lists of sanctioned individuals, entities, vessels, and countries before funds are transferred.
  • Key lists to screen: OFAC SDN and consolidated sanctions lists (USA), UN Security Council Consolidated List, EU Common Foreign and Security Policy sanctions, HMT Financial Sanctions List (UK), and AUSTRAC/ACIC list (Australia) — plus any lists required by your corridor countries.
  • Screening frequency: Real-time at the point of transaction initiation — not nightly batch runs. FATF Recommendations 6 and 7 require targeted financial sanctions to be implemented without delay.
  • False positive management: Apply documented fuzzy-match thresholds, conduct secondary human review for borderline alerts, record every decision with a timestamp, and tune thresholds periodically based on alert volume data.
  • If you miss a hit: You may have processed a sanctioned transaction. You must self-report to OFAC (or your relevant authority), freeze the funds if still accessible, file a Suspicious Activity Report, and preserve all records. Voluntary disclosure typically reduces penalties.
⚠ Operational Guidance Only: This article is written for money transfer operators and compliance teams seeking to understand sanctions screening obligations and system design. It does not constitute legal advice. Sanctions regimes are updated frequently — always verify current list versions with your legal counsel and directly from the issuing authority before making compliance decisions.

Why Sanctions Screening Is Non-Negotiable for MTOs

Money transfer operators occupy a uniquely exposed position in the global payments ecosystem. They move value across jurisdictions, often into corridors where sanctions exposure is highest, and they do so at high volume and speed. Regulators have concluded, consistently, that the risk of sanctions evasion through remittance channels is acute — and enforcement has intensified accordingly.

The legal basis varies by jurisdiction but the obligation is universal. In the United States, OFAC administers economic and trade sanctions under the authority of multiple Executive Orders and statutes including the International Emergency Economic Powers Act (IEEPA). In the UK, sanctions obligations arise under the Sanctions and Anti-Money Laundering Act 2018. In the EU, they flow from EU Regulations under the Common Foreign and Security Policy. In Australia, the Autonomous Sanctions Act 2011 governs.

What these frameworks share is a strict liability standard in many cases. OFAC's civil penalty regime does not require proof of intent — processing a payment to a designated person can result in a penalty even if the operator was unaware. This makes the technical design of your screening system a direct factor in your legal risk exposure.

OFAC Enforcement — Scale of Sanctions Penalties
$1M+ OFAC civil penalty ceiling per transaction — International Emergency Economic Powers Act
$43M Largest single OFAC settlement in a recent remittance enforcement action — OFAC enforcement archive
0-delay Required implementation time for targeted financial sanctions under FATF Recommendation 6

Figure 1: Key enforcement data points. Sources: OFAC, FATF Recommendations 2012 (updated 2023).

The reputational consequences of a sanctions breach can be even more severe than the financial penalty. Correspondent bank relationships — essential for any MTO — can be terminated within days of a sanctions violation becoming public. For a money transfer business, losing correspondent banking is often an existential event.

Effective AML compliance for money transfer businesses begins with sanctions screening. It is the outermost gate — if a sanctioned party slips through, every other compliance layer is compromised.

The Major Sanctions Lists and Their Jurisdictions

Sanctions screening for money transfer operators means checking customer and transaction data against a defined set of government-maintained lists that identify individuals, entities, vessels, aircraft, and geographic regions subject to financial restrictions. The scope of lists you must screen depends on which jurisdictions you are licensed in — but any MTO with US-dollar-denominated flows, US customers, or US counterparties must include OFAC regardless of where it is headquartered.

Key Sanctions Lists by Jurisdiction
List Name Issuing Authority Jurisdiction Update Frequency Coverage
SDN & Consolidated Sanctions List OFAC — US Treasury USA (global reach) Daily Individuals, entities, vessels, aircraft; country programs
UN Consolidated Sanctions List UN Security Council All UN member states Weekly Designated individuals and entities from UNSC resolutions
EU Sanctions (CFSP) EEAS / EU Council EU / EEA Daily Individuals, entities, import/export restrictions by country
HMT Financial Sanctions List His Majesty's Treasury United Kingdom Daily Designated persons, thematic regimes (Russia, Iran, etc.)
Australian Sanctions List DFAT / AUSTRAC / ACIC Australia As updated Autonomous and UN-derived designations
OSFI Consolidated List OSFI / Global Affairs Canada Canada As updated Listed entities under Special Economic Measures Act, UN Act

Figure 2: Principal sanctions lists for MTOs operating across major send-from corridors. Always verify list currency directly from the issuing authority.

OFAC's Extra-Territorial Reach: OFAC sanctions apply to US persons and US-dollar-denominated transactions anywhere in the world. If your MTO uses a US correspondent bank, clears transactions through a US financial institution, or has US-connected ownership, you are subject to OFAC jurisdiction even if you are incorporated outside the United States. Most global MTOs must treat the OFAC SDN list as mandatory regardless of their primary licence jurisdiction.

Beyond these core lists, some jurisdictions maintain sectoral or secondary lists. OFAC's Sectoral Sanctions Identifications (SSI) list targets entities in specific Russian sectors without full SDN designation. The EU maintains country-specific annexes with asset-freeze and travel-ban designations. MTOs operating in the Gulf may also need to screen against lists maintained by the UAE Executive Office for Control and Non-Proliferation and similar Gulf Cooperation Council bodies.

The practical implication is that most MTOs with multi-corridor operations need to maintain a consolidated screening database drawing from at least five to eight separate official sources — updated in real time or near-real time as new designations are published.

FATF Recommendations 6 and 7 Explained

The FATF Recommendations set the global standard for anti-money laundering and counter-terrorism financing. For sanctions screening specifically, two recommendations govern MTO obligations.

FATF Recommendations 6 & 7 — What They Require
R6
Targeted Financial Sanctions — Terrorism & Financing of Terrorism
Countries must implement UN Security Council resolutions on terrorism financing (Resolutions 1267, 1373, and successors) without delay — meaning within hours, not days. Financial institutions must freeze assets of designated persons immediately and without prior notice to the customer. MTOs must screen in real time at the point of transaction initiation, not after funds move.
R7
Targeted Financial Sanctions — Weapons of Mass Destruction Proliferation
Countries must implement UN Security Council resolutions related to WMD proliferation financing (Resolutions 1718, 1737, and successors) with the same without-delay standard. Financial institutions must freeze funds without prior notification. This extends to preventing sanctioned entities from accessing financial services through intermediaries, shell companies, or nested accounts.
Key
The "Without Delay" Standard in Practice
FATF guidance clarifies that "without delay" means within hours of a designation being published, not at the next business day or nightly batch run. For MTOs processing high transaction volumes in real time, this makes batch-only screening architectures non-compliant under FATF standards adopted by FSRB member jurisdictions, which includes the USA, UK, EU, Australia, Canada, and UAE.
R16
Wire Transfer Screening (Travel Rule)
Recommendation 16, which governs wire transfers and payment messages, requires financial institutions to screen originator and beneficiary data against sanctions lists. For MTOs, this means both sender and recipient must be checked — not just the initiating customer. Incomplete beneficiary data that prevents screening constitutes a red flag requiring enhanced due diligence or transaction rejection.

Figure 3: FATF Recommendations 6, 7, and 16 as they apply to MTO sanctions screening obligations. Source: FATF Recommendations 2012 (updated 2023).

FATF Compliance Gap FATF's 2023 Fourth Round mutual evaluations found that a significant proportion of countries rated non-compliant or partially compliant on Recommendation 6 failures stemmed from regulated entities using batch screening rather than real-time checks — a gap directly attributable to legacy compliance technology.

Real-Time vs Batch Screening

The distinction between real-time and batch screening is one of the most operationally significant in sanctions compliance. It determines whether your system can actually meet the "without delay" standard required by FATF Recommendations 6 and 7, and by OFAC's expectation that sanctioned transactions be blocked at the point of initiation.

Real-Time Screening vs Batch Screening
Real-Time Screening (Modern)
Screen at transaction initiation — before funds move
Meets FATF "without delay" standard
New designations applied within minutes of list update
Automated block/alert/clear workflow
Timestamped audit record per transaction
Regulator-ready — preferred in OFAC, FCA, FinCEN guidance
Batch Screening (Legacy)
Funds may move before screening completes
Non-compliant with FATF R6 / R7 "without delay" standard
New designations applied only at next batch run (hours or overnight)
Manual intervention required for every alert
Audit trail gaps between batch cycles
Increasingly rejected by regulators in examination findings

Figure 4: Real-time vs batch screening — compliance and operational comparison for money transfer operators.

Real-time screening is the only architecture that consistently meets regulatory expectations across all major MTO jurisdictions in 2026. Batch screening may have been acceptable a decade ago, but FATF mutual evaluation reports, OFAC examination guidance, and FCA supervisory expectations all point in the same direction: screening must happen before the transaction is processed, not after.

A well-designed real-time screening system also integrates with your broader transaction monitoring layer. A sanctions hit generates an alert that feeds into your case management workflow — not a separate manual process that has to be reconciled against a batch log.

Is Your Screening System Built for Real-Time?

RemitSo's compliance infrastructure screens every transaction against 8+ global sanctions lists in real time, with automated alert workflows and a timestamped audit trail built for regulator examination.

Talk to a Compliance Specialist →

How Fuzzy Matching Works

Exact-name matching alone is not sufficient for sanctions screening. Sanctioned individuals and entities are identified in lists using their names — but those names may appear in different transliterations, with alternative spellings, with aliases, or with date-of-birth or address variations. A screening system that only matches on exact strings will systematically miss hits.

Fuzzy matching is the set of algorithms that allow a screening engine to recognise that "Mohammed Al-Rashid" and "Muhammad Al-Rasheed" may refer to the same person. It typically involves several techniques working in combination.

  • Phonetic matching — algorithms such as Soundex, Metaphone, or Double Metaphone convert names to phonetic representations and compare those, catching spelling variations that sound alike.
  • Edit distance (Levenshtein distance) — measures how many single-character edits (insertions, deletions, substitutions) are needed to transform one string into another. A threshold of 1 or 2 edits catches common typos and transliteration variants.
  • N-gram analysis — breaks names into overlapping character sequences and calculates similarity scores based on shared n-grams. Useful for names where character order matters but individual edits are unreliable.
  • Token matching — splits multi-word names into tokens and checks whether a sufficient proportion of tokens match between the input and the list entry, allowing for name-order variations and middle name inclusion or omission.
  • Alias database matching — sanctions lists often include known aliases. A robust screening system maintains an expanded alias index so that aliases listed in official records are checked alongside the primary name.
  • Transliteration tables — dedicated lookup tables for Arabic, Cyrillic, Chinese, and other script-to-Latin character conversions ensure that names transliterated differently across source documents are still detected.
Threshold Configuration: Every fuzzy matching engine requires a similarity score threshold — a number between 0 and 100 that determines when a potential match is flagged for review. Setting the threshold too high (demanding near-perfect similarity) risks missing genuine hits. Setting it too low creates excessive false positives that overwhelm your analyst team and create customer friction. Most mature compliance programmes calibrate thresholds between 75 and 90 per cent similarity, with secondary review for scores in the 60–75 range. Your threshold policy must be documented and reviewed periodically.

False Positive Management

False positives — alerts generated for customers who are not actually sanctioned — are an inherent feature of fuzzy matching systems. A system sensitive enough to catch genuine hits will also flag customers with common names that partially match a sanctioned person. Managing false positives without suppressing genuine alerts is one of the defining operational challenges in sanctions compliance.

Sanctions Compliance Challenges for MTOs
Name Matching Complexity
Sanctioned individuals' names appear in dozens of transliteration variants, aliases, and partial-name forms across official lists. No single matching algorithm catches all variants reliably. MTOs must run layered fuzzy-match logic — phonetic, edit-distance, token, and alias-based — simultaneously. Failing to do so creates blind spots that a well-resourced sanctions evader can exploit deliberately by using a specific name variant not caught by a simple algorithm.
List Freshness and Latency
Sanctions lists are updated without warning — OFAC, HMT, and EU EEAS all publish new designations at irregular intervals, sometimes multiple times in a day during active geopolitical events. An MTO that pulls list updates once every 24 hours may process transactions involving newly designated parties during the gap. Real-time or near-real-time list synchronisation — ideally with webhook or API-based update triggers from list providers — is the only way to minimise this exposure window.
Nested Accounts and Correspondent Risk
Sanctions evasion frequently occurs through intermediaries — a sanctioned entity uses a shell company, a trusted third party, or a nested account held at a correspondent bank to move funds without appearing directly in the transaction. Customer-level screening alone is insufficient. MTOs must apply enhanced due diligence to corporate customers, verify ultimate beneficial ownership, and monitor for transaction patterns consistent with layering through nested structures. This is a documented finding in OFAC enforcement cases.
Customer Friction from False Positives
Every unnecessary alert that delays or rejects a legitimate customer transaction carries a direct cost — in customer service time, in customer dissatisfaction, and in potential churn. MTOs serving diaspora communities where certain names are extremely common (e.g., Mohammed, Ali, Chen) face particularly high false positive rates if matching thresholds are not properly calibrated. The operational solution is a tiered review workflow: low-confidence alerts auto-resolved with a documented justification, medium-confidence alerts queued for analyst review within defined SLAs, and high-confidence alerts escalated immediately.
Incomplete Beneficiary Data
Sanctions screening must cover both the sender and the beneficiary. In many corridors — particularly cash-pickup and mobile wallet payouts — complete beneficiary information is not always collected at transaction initiation. Regulators expect MTOs to have controls that prevent a transaction from proceeding if beneficiary data is insufficient to perform screening. This requires hard system controls, not just policy statements. A "proceed and screen later" approach to incomplete beneficiary data has been cited as a deficiency in multiple regulatory examination findings.
Audit Trail Completeness
Regulators do not just want to know that you screen — they want to see proof that every transaction was screened, which list version was used, what score was returned, who reviewed it, when the review decision was made, and what action was taken. A sanctions screening system without a complete, searchable, timestamped audit log cannot satisfy examination requirements. The audit record must be retained for a minimum period aligned with your jurisdiction's record-keeping requirements — typically five to seven years in most MTO jurisdictions.

Figure 5: Six operational challenges in MTO sanctions compliance — name matching, list freshness, nested accounts, false positives, beneficiary data gaps, and audit completeness.

Effective false positive management requires a documented disposition process. Every alert — whether cleared, escalated, or resulted in a block — must be recorded with the reviewer's identity, the rationale for the decision, and the timestamp. This record is what regulators will examine when they assess your sanctions compliance programme.

Screening Configuration for Corridor-Specific Risk

Sanctions risk is not uniform across all corridors. A remittance business sending money from the UK to the Philippines faces a materially different sanctions exposure profile than one sending from the USA to Iran — which is prohibited in its entirety under OFAC's Iran sanctions programme. Corridor-specific risk calibration is a key element of a mature sanctions compliance framework.

Sanctions Screening Workflow — Transaction-Level Process
01
Transaction Initiation
Customer submits a send request. System captures full originator details (name, date of birth, ID number, address) and beneficiary details (name, account or mobile number, country). No funds are moved at this stage.
02
Real-Time Sanctions Screen
The screening engine queries the consolidated sanctions database — OFAC SDN, UN, EU, HMT, AUSTRAC, and any corridor-specific lists — against both originator and beneficiary name fields, plus country-of-destination check for embargoed jurisdictions. Fuzzy matching algorithms return similarity scores within milliseconds.
03
Alert Scoring and Triage
Matches above the threshold generate alerts classified by confidence score: high (≥90%) goes to immediate analyst queue with transaction hold; medium (75–89%) enters standard review queue; low (<75%) is auto-cleared with a documented rationale and logged for audit purposes.
04
Analyst Review
For queued alerts, a trained compliance analyst reviews the full customer record, the matching list entry, corroborating data (date of birth, nationality, address), and transaction context. The analyst documents whether the match is a true hit or a false positive, with specific reasoning recorded.
05
Action: Clear, Block, or Escalate
False positive — transaction is cleared and proceeds. Confirmed hit — funds are blocked, the customer is not notified (tipping-off prohibition applies), and the matter is escalated to the MLRO. Possible hit with insufficient data — transaction is held pending additional customer due diligence.
06
Regulatory Action (On Confirmed Hit)
For confirmed matches to OFAC SDN or equivalent: freeze the funds, file a Suspicious Activity Report (SAR) or equivalent, notify OFAC or the relevant authority, and preserve all records. In the UK, a Defence Against Money Laundering (DAML) application may be required before any further action on the funds.
07
Timestamped Audit Record
Every step — initiation timestamp, screening timestamp, list version used, alert score, reviewer identity, decision, action taken — is written to an immutable audit log. This log is retained for the minimum statutory period and is available for regulatory examination on demand.

Figure 6: End-to-end sanctions screening workflow for a money transfer operator — from transaction initiation to regulatory action and audit record.

Corridor risk configuration involves setting rules based on destination country risk levels. Transactions to or from comprehensively sanctioned jurisdictions — currently Iran, North Korea, Cuba, Syria, and certain regions of Ukraine under OFAC programmes — must be blocked at the system level, not just flagged for review. For high-risk corridors that are not comprehensively sanctioned, enhanced screening thresholds and additional due diligence requirements can be configured at the corridor level.

This type of corridor-specific configuration is part of a mature compliance and risk management framework. It ensures that your screening system is calibrated to the actual risk profile of your business — not a one-size-fits-all setting that either over-screens low-risk corridors or under-screens high-risk ones.

What Regulators Check in an Examination

When a financial regulator examines your sanctions compliance programme — whether OFAC, the FCA, FINTRAC, FinCEN, or AUSTRAC — they are not simply checking whether you have a screening tool. They are assessing whether your entire programme is fit for purpose and whether it actually catches sanctioned parties in practice.

Understanding what regulators look for allows compliance teams to build examination-ready systems from the outset rather than scrambling to produce documentation after an examination is announced. The key areas regulators assess include the following.

  • Programme governance: Is there a written sanctions compliance policy approved by senior management? Is there a designated compliance officer with clear sanctions responsibility? Are staff trained on sanctions obligations and updated when regimes change?
  • List coverage and currency: Which lists does your screening system cover? How frequently are lists updated? Regulators will check the version date of lists in use at the time of specific transactions. Stale lists are a common finding.
  • Screening timing: Are transactions screened before funds move? Regulators will trace a sample of transactions from initiation to payment and verify that the screening timestamp precedes the payment timestamp for each one.
  • Fuzzy matching configuration: What is your threshold setting? How was it determined? Is there documentation of threshold calibration based on alert data? Regulators expect a reasoned, documented methodology — not an arbitrary number.
  • Alert disposition records: For a sample of cleared alerts, regulators will ask to see the analyst's recorded rationale. Dispositions recorded as "not a match" with no supporting reasoning are a finding. Dispositions that show genuine analytical work are not.
  • True positive handling: Have you ever had a confirmed sanctions hit? If so, what did you do? Regulators expect to see that confirmed hits were blocked, reported to the relevant authority, and documented. Inability to produce records of how past hits were handled is a serious deficiency.
  • System testing: Is your screening system periodically tested with known sanctioned names to verify it catches them? Testing records — including any failures found and remediated — demonstrate programme rigour.
  • Beneficial ownership controls: For corporate customers, can you demonstrate that you screen ultimate beneficial owners — not just the legal entity name? OFAC's 50% rule means that entities majority-owned by a designated person are themselves subject to sanctions, even if not listed.
OFAC's 50% Rule: Any entity that is 50% or more owned — directly or indirectly — by a person or entity on the OFAC SDN list is itself considered to be an SDN, even if it does not appear on the list by name. This means customer-level screening must extend to corporate ownership structures. An MTO that screens only the legal entity name without checking whether a listed person owns 50% or more of the business is running a compliance gap that OFAC examinations specifically target.

Regulators also assess your sanctions programme's integration with your broader AML/CTF framework. A sanctions alert that is treated in isolation — without consideration of whether it also requires a SAR filing under your AML obligations — represents a process gap. The most examination-ready programmes have an integrated case management system where a sanctions alert automatically triggers the relevant AML workflow checks and vice versa. This is directly connected to the RemitSo compliance features that unify sanctions, KYC, and transaction monitoring in a single case management environment.

Build an Examination-Ready Sanctions Programme

RemitSo's compliance platform gives you documented workflows, timestamped audit trails, and integrated case management — everything a regulator expects to find when they examine your sanctions controls.

Request a Compliance Demo →

How RemitSo Powers Sanctions Screening for MTOs

RemitSo is built for money transfer operators who need compliance infrastructure that works from day one — not a bolt-on module added after the fact. Sanctions screening is embedded into every transaction flow on the platform, not treated as an optional compliance layer.

The RemitSo sanctions screening engine screens against 40,000+ records drawn from 8+ global lists — including OFAC SDN and Consolidated Sanctions, UN Security Council Consolidated List, EU CFSP sanctions, HMT Financial Sanctions List, and applicable local lists — in real time at the point of transaction initiation. No transaction proceeds before screening is complete.

Fuzzy matching and alias detection are built into the engine. The platform maintains an expanded alias index aligned with official list alias data, and applies phonetic, edit-distance, and token-based matching to catch transliteration variants and name-order differences. MTOs can configure matching thresholds aligned with their risk appetite and corridor profile.

Every screening event generates a timestamped audit record — list version used, match score returned, disposition decision, reviewer identity, and action taken. This record is stored immutably and is accessible for regulatory examination. The audit trail is integrated with RemitSo's KYC and AML/CTF case management module, so a sanctions alert automatically surfaces relevant customer risk data in a unified case view.

The automated clear/alert/block workflow reduces analyst workload on low-confidence false positives while ensuring that high-confidence matches receive immediate escalation with a transaction hold applied before any funds move. Alert queues are configurable by corridor risk level, allowing compliance teams to focus review resource on the highest-exposure transaction populations.

For MTOs at any stage — from pre-launch through to regulated operations across multiple corridors — RemitSo's compliance architecture is designed to grow with your business without requiring a compliance rebuild at each new licensing milestone. Learn more about the full RemitSo compliance features and how they map to your regulatory obligations.

Real-Time Sanctions Screening with RemitSo

RemitSo gives money transfer operators a production-ready sanctions screening system that meets FATF, OFAC, FCA, and multi-jurisdiction standards — integrated with KYC, transaction monitoring, and case management from day one.

  • Real-time sanctions screening (40,000+ records)
  • 8+ global lists (OFAC, UN, EU, HMT, local)
  • Fuzzy matching and alias detection
  • Automated clear/alert/block workflow
  • Timestamped audit trail for regulators
  • Integrated with KYC and transaction monitoring

Frequently Asked Questions

What MTOs and Compliance Teams Ask About Sanctions Screening

Sanctions screening is the automated process of checking customer names, beneficiary names, and transaction details against government-maintained lists of designated individuals, entities, vessels, and sanctioned countries before a money transfer is processed. The purpose is to prevent financial services from being provided to parties subject to economic sanctions — who may be involved in terrorism financing, WMD proliferation, drug trafficking, or other activities that governments have responded to with financial restrictions. For money transfer operators, sanctions screening is a legal obligation enforced by regulators in every major send-from jurisdiction, including the USA (OFAC), UK (FCA/HMT), EU, Australia (AUSTRAC), and Canada (FINTRAC). Processing a transaction involving a sanctioned party — even unknowingly — can result in civil penalties, criminal liability, and licence revocation.

The required lists depend on your jurisdiction and transaction flows, but most MTOs must screen against at minimum: OFAC's SDN and Consolidated Sanctions List (USA — also applies to any MTO using US dollars or US correspondent banks), the UN Security Council Consolidated List (applicable to all UN member states), the EU CFSP financial sanctions list (for EU/EEA licensed MTOs), the HMT Financial Sanctions List (for UK-licensed MTOs), and AUSTRAC/DFAT sanctions (for Australian-licensed MTOs). Canadian MTOs must screen against the OSFI Consolidated List under the Special Economic Measures Act and the United Nations Act. MTOs operating in the UAE should also screen against UAE Executive Office for Control and Non-Proliferation lists. A comprehensive screening programme typically draws from 8 or more official sources and consolidates them into a single searchable database that is updated in real time or near-real time.

FATF Recommendations 6 and 7 require targeted financial sanctions to be implemented "without delay" — meaning within hours of a new designation being published, not at the next batch run. In practice, this means MTOs must screen every transaction in real time at the point of initiation, before funds are moved. Batch screening — where transactions are processed first and screened overnight — does not meet the "without delay" standard and is increasingly cited as a deficiency in regulatory examination findings. MTOs should also re-screen existing customers periodically (typically quarterly or when a designation update is published) to catch newly designated parties who are already in the customer database. The list update frequency itself varies by authority: OFAC and EU EEAS update daily; HMT updates daily; UN Security Council updates less frequently but without a fixed schedule.

Fuzzy matching is a set of algorithms that allow a sanctions screening engine to identify potential matches between a customer name and a sanctioned person's name even when the spelling is not identical. This is essential because sanctioned individuals' names appear in official lists in specific transliterations, but those same individuals may submit documents or be referred to in other documents with different spellings, aliases, or name-order variations. Common fuzzy matching techniques include phonetic matching (Soundex, Metaphone), edit-distance algorithms (Levenshtein distance), n-gram analysis, token-based matching, and dedicated transliteration tables for Arabic, Cyrillic, and Chinese to Latin character conversions. A compliance-grade screening system also maintains an expanded alias index derived from the alias data published in official sanctions lists. Every screening system requires a configured similarity threshold — typically between 75 and 90 per cent — that determines when a potential match is flagged for human review rather than auto-cleared.

When a screening system generates a potential match (a "hit"), the transaction must be held — funds must not move — pending review. A trained compliance analyst reviews the alert by comparing the customer data against the list entry, checking corroborating identifiers such as date of birth, nationality, and address. If the match is determined to be a false positive (the customer is not the designated person), the transaction is cleared with a documented rationale and proceeds. If the match is confirmed as a genuine sanctions hit, the funds must be blocked or frozen immediately. The tipping-off prohibition means the customer must not be notified that the hold is sanctions-related. The MLRO or compliance officer must be notified, a Suspicious Activity Report must be filed with the relevant financial intelligence unit, and the sanctioned funds must be reported to the relevant authority — OFAC in the USA, the Office of Financial Sanctions Implementation (OFSI) in the UK, or the equivalent. All steps must be timestamped and recorded.

There is no universal regulatory target for false positive rates — regulators focus on whether your programme catches true hits rather than on minimising false positives per se. However, from an operational standpoint, false positive rates above 95–98% of all alerts are common for MTOs with high-volume, common-name customer populations. The practical management goal is to configure matching thresholds at a level where your analyst team can review all non-auto-cleared alerts within defined SLAs without the alert volume being so high that it creates a backlog that delays genuine transactions. Your threshold calibration methodology, alert volume trend data, and the average time-to-disposition for alerts are all metrics that regulators assess as indicators of programme health. MTOs should review and document their threshold settings at least annually, and adjust when alert volume data shows that the threshold is generating unsustainable analyst workloads or, conversely, is missing obvious near-matches.

OFAC civil penalties for sanctions violations can reach up to $1 million or twice the value of the transaction per violation, whichever is greater, under the International Emergency Economic Powers Act (IEEPA). Criminal penalties under IEEPA include fines up to $1 million and imprisonment up to 20 years per wilful violation. OFAC operates a strict liability civil penalty standard — meaning that intent to violate sanctions is not required for a civil penalty to apply. However, OFAC's enforcement framework does consider several factors that influence the penalty amount, including whether the MTO voluntarily self-disclosed the apparent violation, the strength of the compliance programme in place, the nature and duration of the violation, and whether the violation was wilful or reckless versus unintentional. Voluntary self-disclosure of an apparent violation typically reduces the penalty significantly and is always the recommended course of action when a possible sanctions breach is discovered. MTOs should refer directly to the OFAC website for current penalty guidelines and enforcement actions.

RemitSo provides a built-in real-time sanctions screening engine that is part of the core compliance infrastructure available to every MTO on the platform. The engine screens against 40,000+ records drawn from 8+ global lists — including OFAC SDN and Consolidated Sanctions, UN Security Council Consolidated List, EU CFSP sanctions, and HMT Financial Sanctions List, alongside applicable local lists for additional jurisdictions. Fuzzy matching and alias detection are integrated into the engine, applying phonetic, edit-distance, and token-based algorithms to catch name variants and transliterations. Every transaction generates a timestamped audit record covering the list version used, the match score returned, the disposition decision, and the action taken — all stored in a format accessible for regulatory examination. The screening workflow is integrated with RemitSo's KYC and AML/CTF case management module, so compliance teams work from a unified case view rather than separate systems. MTOs can request a demo to see the sanctions screening and compliance module in operation.

Launch Your MTO with Sanctions Screening Built In

RemitSo's compliance-first platform gives you real-time sanctions screening across OFAC, UN, EU, and HMT — integrated with KYC and AML workflows from day one, so you are examination-ready before your first transaction.

Get Started with RemitSo →

Remittance Platform Features Checklist for MTOs 2026

Continue Reading

White-Label Remittance Platform for Banks and Credit Unions 2026

Continue Reading

WhatsApp Icon