For instance, the bank is expected to use the customer information and facts and customer threat profile in its suspicious activity monitoring method to comprehend the types of transactions a selected customer would Commonly be envisioned to interact in being a baseline versus which suspicious transactions are recognized and to fulfill other regula