ࡱ> tbjbj 8:".'())))))8)-).60/0^00|1F45|$3հ)LT|1|1LTLT))00ӫYYYLT)0)0YLTYY^08J)TNܪ0ԗvV&^^:)D262 d@HYGM262626X262626LTLTLTLT262626262626262626 &:Money laundering: correlation between risk assessment and suspicious transactions SONJA CINDORI, PhD* Review article** Abstract The risk assessment system was introduced in the Republic of Croatia in 2009, as a result of harmonization with international standards, especially the Directive 2005/60/EC on the prevention of the use of the financial system for the purpose of money laundering and terrorist financing. Risk assessment is an extensive concept which requires not only a legislative framework, but also the application of numerous criteria for its effective implementation in practice. Among these criteria are suspicious transactions, closely related to the assessment of the customer, transaction, product or service. The undeniable contribution of suspicious transactions to the quality of the risk assessment system will be confirmed by a statistical analysis of a number of West and East European countries. A combination of strict, but sufficiently flexible legal provisions governing the system for prevention of money laundering and terrorist financing and a statistical analysis of reported suspicious transactions will lead to conclusions that either support or represent criticism of the efficiency of application of the risk assessment system in practice. The aforementioned statistical analysis will show whether suspicious transactions are a reliable criterion for the risk assessment analysis, and whether they can be considered the only such criterion. There is a possibility that the findings of the analysis will be contradictory to those of some international studies. Keywords: money laundering, suspicion, transaction, risk, risk assessment, statistics, analysis. Introduction The variety of possibilities to convert illegal into apparently legal money suggests that money laundering is a complex activity. Without prejudice to the unbounded sophistication, inventiveness and imagination of money launderers in finding perfect way to launder money, preventive measures to this effect include the detection of cash and suspicious transactions through risk assessment, i.e. the application of a risk-based system. This raises the issues of implementation of the idea of money laundering prevention through risk assessment, the legality of its practical consequences and logicality of its realisation. Resolving these issues requires understanding of the definition and nature of risk assessment. In this context, suspicious transactions represent the backbone of any money laundering prevention system, the analysis of which will show how the risk assessment operates in practice. Meaning of the "risk-based approach" system The primary characteristic of the money laundering prevention system based on risk assessment is that it is complex and necessarily resilient. While on the one hand the financial and non-financial sectors are required to apply some basic prevention rules, on the other hand they are supposed to have their own approaches to risk assessment, and hence to the reporting of suspicious transactions. The main principle underlying any system for the prevention of money laundering and terrorist financing is that the higher the risk of money laundering the closer the attention needed from all competent institutions. Yet, following this principle is far from simple. Unlike with the rule-based system applied so far, the logic behind the risk-based system is entirely different. A system based on rules initially requires from all those responsible for the prevention to apply clear and rigid rules in legally prescribed situations. Within such a system, financial and non-financial institutions, being the chief agents of prevention, are focused on meeting the precisely defined legal conditions (treating them equally) rather than on taking the pulse of potential money launderers. A much greater effort is required to change the perception of the importance and scope of money laundering prevention, from the routine fact-finding prescribed by law to the assessment of each client through a sophisticated risk assessment filter. Unavoidable in this context is the appropriate application of the legislation as well as guidelines and indicators to be adjusted to each particular case and then used in practice. Accordingly, the risk assessment system requires not only the assessment, but also classification of risks and their materialisation in the form of suspicious transactions. While suspicious transactions constitute the backbone of the risk, it is clear that there are no universally accepted methodologies to describe the nature and scope of such transactions. They appear through the identification and classification of the money laundering and terrorist financing risks, which results in the establishment of control mechanisms tailored to the detected risk. This statement does not mean the absence of any principled rules applying to the customer and the customer's business. The imposed rules only represent a framework for action, with a certain degree of flexibility of implementation, in accordance with the risk assessment for each category of customers, transactions, products or services rendered. 2.1 Risk categorisation The FATF Guidance on the Risk-Based Approach to Combating Money Laundering and Terrorist Financing indicates three steps in an effective implementation of the risk-based approach, namely the risk detection, risk assessment and development of strategies to manage and mitigate the risks (Financial Action Task Force, 2007). The risk, as the basic concept, is closely related to the customer, product of service, including the manner of conducting transactions and geographic location of the country assessing the risk. The said FATF Guidance recognises three risk categories: low risk, high risk and innovation (new technologies to ensure anonymity). The fourth category comprises mechanisms for the analysis of applied procedures for deciding on the level of risk, the way of acting upon identified risks and the evaluation of such actions. Risk assessment should be tailored to each customer, product or service, by employing a measure corresponding to the degree of identified risk. However, it is not unthinkable that two financial institutions could take different decisions on the basis of similar parameters. This reaffirms the fact that the risk assessment method is not easy to apply. The sharper the deviation from the risk assessment principle the stronger the possibility of negative consequences. While the overestimation of risk is impossible due to limited time, personnel and information sources, its underestimation is an unacceptable alternative. A good risk assessment system should primarily be balanced. To this effect, an efficient application of the risk-based approach should include the undertaking of customer due diligence, as well as effective supervision and information exchange between the financial intelligence unit (hereinafter: FIU) and all institutions participating in the prevention of money laundering and terrorist financing. 3 Suspicious transactions The money laundering risk assessment by its nature consists in the filtering of all available information in order to identify suspicious transactions or customers. Given the complexity of the money laundering process, it is clear that the detection of suspicious transactions involves a set of different preventive measures. If the money laundering stages are viewed from the perspective of implementation of the money laundering risk assessment, the placement and layering stages are the most relevant in the process of transforming money into a more convenient form of assets (Cindori, 2010). Despite the differences in the money laundering modalities with respect to the amount of money to be laundered, relevant legislation, economic situation, financial market, chosen method of operation (through the financial or non-financial sector), as well as the actual (stages of the) process through which the dirty money goes, the money laundering risk can be most easily assessed during these two stages, because they offer unlimited opportunities to carry out due diligence of the customer, a product or a transaction. At the first stage, by placing money into the financial system or converting it into another form of assets, money launderers are already subject to customer due diligence, i.e. the application of the risk-based system. At the second stage, cash is deposited in one or several accounts (held by one or more persons) with a view to fragmenting large amounts of money and channelling them to various natural or legal persons and changing the form of money. The activities subsequently carried out by legislators for prevention purposes, i.e. the detection of suspicious or illogical transactions, most frequently constitute modus operandi at the layering stage. From this perspective, it is easy to conclude that suspicious transactions are very difficult to detect at the third money laundering stage (integration stage). 3.1 Suspicious transactions in the European Union The EU directives on prevention of the use of the financial system for money laundering purposes very clearly show the evolution of the definition of suspicious transaction. By setting up the fundamentals of a prevention strategy to combat money laundering, these directives impose the need for harmonization and adjustment of national legislations. In this context, the need is emphasized to set up an anti-money laundering system relying on a risk-based approach, which will increases the importance of suspicious transactions and their treatment. The first attempts to set up a framework for preventive measures in the area of anti-money laundering were made in the Directive 91/308/EEC (hereinafter: First Directive), which was the first to define, although very elastically, the term suspicious transaction. As this definition required from credit and financial institutions to check each transaction that might be connected with money laundering, the content of the term was obviously vague and it should necessarily undergo legislative revision at the national level. Taking into account that the First Directive was only guidance for action at the national level, despite the very elastic definition of suspicious transactions it provided (Graham, Bell, Elliott, 2006), it in a way created a basis for preventive action. The Directive 2001/97/EC (hereinafter: Second Directive) does not go much further in developing the definition of suspicious transactions, but it identifies independent professions and occupations that are exempt from the obligation to report suspicious transactions in certain cases. In contrast to the first two directives, the Directive 2005/60/EC on the prevention of the use of the financial system for the purpose of money laundering and terrorist financing (hereinafter. Third Directive) is based on risk assessment and hence it deals with the issue of detecting suspicious transaction in an entirely different way. The Third Directive assigns a new role to suspicious transactions, seeing them (indirectly) as the backbone of money laundering prevention through a risk-based system. In the Directive, the term 'suspicious transaction' is not explained in the form of a definition, but is hidden in Article 20 (Reporting Obligations). While it, to some extent, repeats the definition from the First Directive, this Article expands the concept of suspicious transactions to include complex and unusual transactions, specifying and elaborating on the concept of 'being suspicious'. All this said, there is no doubt that suspicious transactions are important for setting up a money laundering prevention system, as reflected in the obligation of all institutions and persons covered by the Third Directive to carry out customer due diligence, which is a signal of a new, risk-based approach to suspicious transactions. The implementation of customer due diligence measures and their content clearly suggest that the perception of money laundering goes far beyond the disposing of cash, and the suspicion of money laundering exists from the customer identification at the moment of (or before) establishing a business relationship to the verification of data. Suspicion also exists when carrying out other due diligence activities which require an ongoing gathering of information on the purpose and envisaged nature of the business relationship and its continuous monitoring, with a view to creating the customer, business and risk profiles and identifying the source of the customer's funds. Similar development logic of suspicious transactions can be found in the FATF Recommendations. Significant changes towards risk assessment can be observed in the latest revised FATF Recommendations 2012. Both financial and non-financial sectors are increasingly focused on higher-risk areas, while the measures applicable to lower-risk areas become simpler and more elastic. 4 Risk assessment system in the Republic of Croatia The legislation of the Republic of Croatia has been developed in accordance with the three aforementioned directives. The first anti-money laundering law was passed in 1997. The definition of suspicious transactions was not given separately, but it arose from the content of customer identification procedures, which did not specify the characteristics of a suspicious transaction, but a suspicious transaction was considered to be any cash or non-cash transaction for which there is suspicion of money laundering. By introducing amendments to the Anti-Money Laundering Act (hereinafter: AMLA) considerable progress was made in this respect, but without any substantial changes in the operation of the Anti-Money Laundering Office (hereinafter: Office). There was still no definition of suspicious transactions, although the term was used in the general provisions on the activities of the Office in detecting suspicious transactions, concealing the true source of money, property or a right suspected to have been obtained illegally in the country or abroad. While this undoubtedly emphasized the importance of suspicious transactions, it was quite certain that the Office's activities were still focused on cash transactions. By following the Third Directive, the Republic of Croatia introduced a new Anti-Money Laundering and Terrorist Financing Act (hereinafter: AMLTFA), thereby adopting the risk assessment system. In other words, the necessity to carry out customer due diligence and risk assessment as crucial measures has been mentioned throughout the AMLTFA. Consequently, suspicious transactions play a leading role in the detection of money laundering and terrorist financing. This is reflected in the obligation of the Office to carry out analytical data processing exactly on the basis of substantiated reasons for suspicion of money laundering or terrorist financing. Besides suspicious transactions, the AMLTFA also recognizes complex and unusual transactions. In contrast to suspicious transactions that arouse a certain degree of suspicion sufficient for establishing a criminal offence, an unusual transaction is considered to be any illogical transaction in relation to which no criminal offence has yet been established. Given these criteria, it is beyond doubt that a large number of reported suspicious transactions actually constitute unusual or illogical transactions (Savona, 2004). This is exactly why the legislator emphasized the need to pay close attention to all complex and unusual transaction, as well as to any other unusual form of transaction having no obvious economic or legal purpose. The risk assessment system definitely requires that such transactions be monitored, even in situations when no reasons for suspicion of money laundering or terrorist financing have yet been identified. 4.1 Definition and assessment of risk The guiding principle of the AMLTFA arises from the risk assessment, as shown in Article 7 of the Act, providing a definition of the money laundering and terrorist financing risks. The focus is principally on the risk that a customer might misuse the financial system for money laundering or terrorist financing, or that a business relationship, a transaction or a product might be directly or indirectly used for money laundering or terrorist financing purposes. In order to reduce the risk, reporting entities are obliged to undertake a risk analysis and use it for assessing the risk of a group or type of customers, a business relationship, a product or a transaction with respect to their potential misuse for money laundering or terrorist financing purposes. In this context, reporting entities may include in the group of customers representing a negligible risk only the customers determined by a rulebook laid down by the finance minister. The limitation regarding risk assessment arises from the reporting entity's obligation to comply with the guidelines issued by competent supervisory authorities. In other words, during the risk analysis and assessment both the reporting entity and supervisory authority are obliged to consider the specific characteristics of the reporting entity and its business, while taking into account the size and organisational structure of the reporting entity, the type of customers it deals with and the type of products it offers. 4.2 Definition of suspicious transactions The risk assessment procedure inevitably entails the definition of the concept of 'suspicious transactions. Treating risk assessment as the guiding principle, the AMLTF treats suspicious transactions with equal care, surpassing the criteria set in accordance with international standards. In light of this, according to the Act, a suspicious transaction is any attempted or executed cash or non-cash transaction, regardless of its value and the manner of its execution. Already in the first part of the definition the legislator emphasizes the active role of a reporting entity in the detection of (innovative) money laundering or terrorist financing attempts. The definition further indicates three characteristics a transaction may (but not necessarily must) have in order to be considered as suspicious: It must be connected with illegal sources or funds or with terrorist financing; It must deviate from a customer's normal operation, taking into account the set indicators; and There must be an attempt to find loopholes in the law. Besides these possible reasons for suspicion of money laundering, established on the basis of categorisation, considered as suspicious is also any transaction or customer for which/whom the reporting entity deems that there are reasons for suspicion of money laundering or terrorist financing. As suspicious transactions, by their very nature, pose high money laundering and terrorist financing risks, each reporting entity is obliged to detect them within its activity, taking into account the specificities of the business. This confirms that the AMNLTFA is founded on risk assessment, the monitoring of the customer's operations and collection of information on the purpose and envisaged nature of the business relationship. This is why the compilation of a list of indicators for the detection of suspicious transactions and persons in relation to which there are reasons for suspicion of money laundering or terrorist financing is within the competence of the reporting entity. 4.3 Treatment of suspicious transactions Besides the aforementioned definition of a suspicious transaction, the AMLTFA, in its very introduction, defines a suspicious transaction as any transaction for which a reporting entity and/or a competent authority deems that there are reasons for suspicion of money laundering or terrorist financing in relation to that transaction or a person conducting the transaction, or a transaction suspected to involve funds derived from illegal activities. While it is emphasized that a competent authority can also assess a transaction a suspicious, based on a subsequently conducted strategic analysis, the focus is also on the importance of such transactions for the prevention of money laundering and terrorist financing. In order to be classified as suspicious, transactions must be previously passed through the risk assessment filter, i.e. subjected to customer due diligence measures. The customer due diligence measures comprise identifying the customer and the beneficial owner and verifying their identities, as well as collecting information on the purpose and intended nature of the business relationship or a transaction. Besides these due diligence measures, it is particularly important to conduct ongoing monitoring of the business relationship to ensure the implementation of the risk assessment system in the way that the transaction analysis is consistent with the reporting entity's knowledge about the customer, type of business and risk, including, where applicable, information on the sources of funds. The same reasoning applies to the supervision of reporting entities. The Financial Inspectorate supervises compliance with the AMLTFA of all reporting entities exclusively on the basis of the assessment of money laundering and terrorist financing risks. In this context, should the Inspectorate establish that a legal person, a member of the management board (or another responsible person of the legal person), or a natural person has failed to make a risk analysis, or risk assessment for a particular group or type of customers, business relationships, products or transactions, or if such persons have failed to align the risk analysis and assessment with the guidelines issued by a competent supervisory authority, it can impose a fine on such persons for the committed violations. 4.4 Acting upon suspicious transactions The treatment of suspicious transactions is also reflected in the manner of reporting suspicious transactions and of how the Office acts upon them. Should a reporting entity, after the risk analysis, know or suspect that a transaction is connected with money laundering or terrorist financing, it should notify the Office of such a transaction without delay prior to the execution of the transaction. The notification should be sent by telephone, fax or in another appropriate way, indicating all reasons for the suspicion of money laundering or terrorist financing and the deadline for the execution of the transaction. Particularly important is the submission of information on the intention and planning to carry out a suspicious transaction, regardless of whether the transaction has subsequently been executed or not. By following the same line of logic, the commencement of the analytical processing by the Office is closely related to the transactions or persons in respect of which a reporting entity or a competent authority submits substantiated reasons for suspicion of money laundering or terrorist financing. Thus, the legislator has placed emphasis on the fact that the Office should acts upon transactions for which the risk analysis has been made, and has limited any action based on strict compliance with the rules. As a consequence of this, the number of "formally" open cases, encouraged under the old AMLA, was now reduced, which released additional resources for the Office. 4.5 Complexity of the scope of "substantiated reasons for suspicion" The way the Office acts upon "submission of substantiated reasons for suspicion of money laundering or terrorist financing " shows that the Office does not consider only suspicious transactions, but also all other transactions, either cash or linked transactions, for which it receives substantiated reasons for suspicion of money laundering or terrorist financing" from a reporting entity. The money laundering methods and typologies used by natural persons support the need for such an approach, but also for a more flexible, risk-based procedure. For example, depositing unusually large cash amounts, as a money laundering typology used by natural persons, includes cash deposits in all types of accounts which deviate from the normal customers account turnover. These are usually considerable amounts derived from illegal activities and representing illegal income of the customer. Most transactions of this type are not consistent with the business and economic criteria. The very name of this money laundering method suggests that it deals with cash deposits, i.e. cash transactions. However, as the content of the term "unusually" (large amounts) varies from customer to customer, and is determined, e.g. by a customers business background, the values of such suspicious or illogical transactions very often remain below the legally prescribed limit for "cash transactions" subject to reporting to the Office. In assessing the risk of such transactions and identifying the character of their dubiousness, the first thing to do is to organise training for employees of financial and non-financial institutions who should be able, based on the indicators of suspicious transactions and information on the customer's business, to detect a suspicious transaction and establish whether a business is really illegal. As unusual or large cash deposits are conspicuous and open up further possibilities of a quick detection of money laundering cases, the so-called "linked transactions" are usually used in practice. They imply breaking down a large amount into several smaller amounts (to evade the reporting threshold for cash transactions), because smaller cash amounts apparently represent a better way of money laundering. The breaking down of a transaction into smaller amounts and creation of "linked transactions" in order to evade the reporting requirements is referred to in English literature as "structuring". Richards uses the same term explaining it as follows: a person structures a transaction if that person, acting alone, or in conjunction with, or on behalf of other persons, conducts, or intends to conduct, one or more transactions in currency, in any amount, at one or more financial institutions, on one or more days and in any manner, for the purpose of evading the reporting requirements... (Richards, 1998). Given this definition of the term structuring, it is beneficial to use the suspicious transaction indicators in order to facilitate the detection of linked transactions which are in themselves defined elastically, due to the complexity of their execution and impossibility of their strict regulation. Consequently, it is obvious that, like cash and suspicious transactions, linked transactions can also be the subject of consideration for the Office, provided that there are "substantiated reasons for suspicion of money laundering or terrorist financing" with respect to such transactions. They will be considered as suspicious transaction and recorded in the Offices statistics. Concrete analyses of suspicious transactions will show why this is important and what we can learn about the risk-based system from the statistics on reported suspicious transactions. 5 An analysis of suspicious transactions as risk assessment system analysis The application of a risk-based based system is far from being simple, from the perspectives of both legislative regulation and practical implementation efficiency. The complexity of the system is due to suspicious transactions, the content of which is indeterminable while their scope must not be limited. It is exactly this legislative philosophy that the risk assessment system is based on. In order to prove the efficiency of application of such a system in the Republic of Croatia, we compared the statistics on suspicious transactions reported in the period 2005-2010 across ten countries of different sizes and at different levels of development and compliance with international standards. 5.1 Impact of the risk-based approach on the number of reported suspicious transactions According to the Final Study on the Application of the Third EU Directive on the prevention of the use of the financial system for the purpose of money laundering (hereinafter: Final Study), a risk-based system has a positive influence on reporting on suspicious transactions, in terms of the number of reported suspicious or unusual transactions, quality of such reports and their effects on the detection of suspicious transactions. In the discussion on the 'number of reported suspicious transactions' criterion and its relationship to the "quality of the reports" criterion in the said Final Study, it is emphasized that these two criteria are interdependent, i.e. that there is an increase in both the number of reported suspicious transactions and the quality of the reports, as a consequence of the application of the risk-based approach (as opposed to the previously applied rule-based approach). As the application of the risk-based approach in the Republic of Croatia shows a completely opposite trend, i.e. a fall in the number of reported transactions, this problem demands closer attention in order to establish the real correlation between the number of reported suspicious transactions and the achievement of the main goals of the risk assessment system. Table 1 Reported suspicious transactions related to money laundering, 2005-2010 YEARCOUNTRY200520062007200820092010Bulgaria 680374431 591 883 1,460France 11,553 12,047 12,481 14,565 17,310 19,208Croatia 2,908 2,891 2,857 2,323 629 602Liechtenstein  192 161 205 157* 235 261*Germany 8,241 10,051 9,080 7,349 9,046 11,042Romania 3,858 3,195 2,574 2,332 2,259 2,925Slovenia 116 165 192 248 199 233Serbia 138 622 1,432 2,884 3,957 4,537Switzerland 729 619 795 851 896 1,159Ukraine 350,507313,074 322,966 290,418227,192 96,221 ** Source: MONEYVAL Reports and Annual Reports of the stated countries. * Reports on suspicious transactions received by 1 October 2008/2010. ** Reports on suspicious transactions received by 1 August 2010. 5.1.1 A fall in the number of reported suspicious transactions In order to understand the real nature of the risk assessment system and its correlation with the number of reported suspicious transactions, an analysis will be made of a fall in the number of reported suspicious transactions, observed in the Republic of Croatia, Slovenia and Ukraine. 5.1.1.1 Croatia The data on suspicious transactions related to money laundering, reported to the Office in the period 2005-2008 clearly show that their number was constant. With the entry into force of the AMLTFA in 2009, under which the risk-based approach was used in the detection and reporting of suspicious transactions, the number of suspicious transaction reports decreased up to five times (in 2009 and 2010). A comparison between the four-year period of application of the AMLA (2005-2008) and the two years of application of the AMLTFA (2009-2010) clearly shows that half as many suspicious transactions (on average) were reported in the two-year period of applying the risk-based approach as in one year of application of the rule-based approach. The established decline in reported suspicious transactions was due to the application of the AMLTFA, which provides a very detailed description of the nature of suspicious transactions. Besides in the AMLTFA, suspicious transactions are also dealt with in the Regulations on the Notification of the Anti-Money Laundering Office of Suspicious Transactions and Persons , with a detailed specification of the manner of and deadlines for reporting, as well as additional information to be submitted to the Office, and the electronic data delivery. As a result of a detailed prescription of the content of a suspicious transaction and of assigning an active role to reporting entities in setting up indicators for the detection of suspicious transactions, as well as their frequent participation in the training measures (in 2009 and 2010), the statistics only confirm an improvement in the quality of reports on suspicious transactions to the detriment of their quantity. Reporting entities have thus shown their maturity in the assessment of risks and detection of suspicious, unusual or illogical transactions. This mainly applies to the financial sector, i.e. banks, because they accounted for 90% of total suspicious transactions reported in the period 2005-2008, while this share dropped to 50% in the period 2009-2010. Nevertheless, the number of suspicious transaction reports coming from the non-banking and non-financial sectors remained unchanged, leaving a plenty of room for improvement and the overall system development. Another reason for the expected evolution of the risk assessment system in terms of the number of open cases and forwarded notifications of suspicious transactions (NST) is that in the period 2009-2010, 642 cases were opened and 235 NSTs sent to the competent authorities for further processing pursuant to the received reports on suspicious transactions. Or, out of 1231 suspicious transactions reported by reporting entities in the period from 2009 to 2010, the Office opened 642 cases (52% of suspicious transactions reported in this period), whereas 235 NSTs submitted account for 19% of the total suspicious transaction reports. 5.1.1.2 Slovenia, Romania and Ukraine Slovenia also saw a decline in reported suspicious transactions in 2009. However, worth noting are some typical characteristics of the money laundering (and terrorist financing) prevention practice in Slovenia. The Slovenian Anti-Money Laundering and Terrorist Financing Act came into force in mid-2007. A comparison between the number of suspicious transaction reports in 2005 (116) and 2006, when a rule-based approach was used (165), suggests their increase. But as early as 2007, after the harmonisation of the national legislation with international standards and the introduction of a risk assessment system in the middle of the year, only a minor increase was observed in reported suspicious transactions (192), probably due to the new principle of operation. In 2008, however, their number rose to 248, but fell again to 199 in 2009. Another increase in the number of reported suspicious transactions was seen in 2010 (233). As these were only slight changes in the already small number of reported suspicious transactions, and one could hardly talk about regularity in the number of suspicious transactions as the result of application of the risk assessment system. The only constant was the active participation of the financial sector, notably banks, (with 75% to 80%) in the total number of reported suspicious transactions in the period 2008-2010. Nevertheless, the fact that the total number of reported suspicious transactions equals the number of open cases suggests that there is some degree of awareness among Slovenian reporting entities about this matter and that Slovenia's Office works efficiently. Like most countries, Romania aligned its legislation with international regulatory standards as late as 2008, although it had recognised the importance of the prevention of terrorist financing back in 2002. Judging by statistics, a downward trend in reported suspicious transactions was observed in the period 2005-2009, with the exception of 2010, when an increase was recorded. As the number of suspicious transactions went up (to 2,925 in 2010), credit and financial institutions continued to account for a large share (90%) in total reported suspicious transactions. In 2010, however, the number of reported suspicious transactions increased by 29% from 2009, as a result of training within a twinning project in cooperation with the Polish FIU and the application of on-line reporting parameters (Cindori, 2008). The increase in the number of suspicious transactions by raising the awareness of the financial sector (primarily through training) certainly suggests a positive trend. However, giving prominence to on-line reporting as an indicator of an (artificial) increase in this number is surely negative. Besides Croatia, Slovenia and Romania, Ukraine is also on the list of countries showing a downward trend in suspicious transaction reporting. This country is special in terms of its system for the prevention of money laundering and terrorist financing, as it had no adequate national legislation to this effect until 2003, but exclusively followed the relevant international standards, primarily the FATF Recommendations. It was therefore put on a blacklist of non-cooperative countries (Cindori, 2010). Based on a Law on the Prevention of and Counteraction to Legalisation (Laundering) of Illegal Proceeds from Crimes that entered into force in 2003, the country established a money laundering prevention system and harmonised its legislation with the Third Directive by introducing a Law on the Prevention of and Counteraction to Legalisation (Laundering) of Illegal Proceeds from Crimes and Terrorist Financing in 2010.) Despite the small size of Ukraine, statistical data suggest an enormous number of reported suspicious transactions in the country. Despite a fall in these transactions from 350,000 in 2005 to 96,221 in 2010, their number is still huge. Even the smallest recorded number of suspicious transactions (96,221) reported in 2010 (the figure refers to the period before 1 August 2010) is 160 times the number of such transactions reported for the same year in, e.g. Croatia (602). According to the statistical data given in Table 1 and their comparison with the data on reported suspicious transactions in Ukraine, the real number of reported suspicious transactions is expected to decline in the future, due to compliance with international standards and the implementation of a risk assessment system. 5.1.2 An increase in the number of reported suspicious transactions In contrast to the described downward trend in reported suspicious transactions in Croatia, Slovenia, Romania and Ukraine, the Final Study supports the view that an increase in the number of reported suspicious transaction can be accounted for by a comprehensive implementation of the risk assessment system. The following statistics for a number of developed Western and North European countries will show whether this is really true and to what extent the evaluation of a risk assessment system can be based on the number of reported suspicious transactions. 5.1.2.1 Switzerland, France, the Netherlands and Germany Switzerland saw a modest increase in reported suspicious transactions from 2006-2009, which was even sharper in 2010 (29%). In the Annual Report for 2010 the upsurge in reported suspicious transactions was accounted for by the investigation of two complex cases in the banking sector which resulted in a large number of reports on suspicious transactions (144). Despite this, the banking sector continued to participate with 71% in the total number of reported suspicious transactions. An increase in the number of reports on suspicious transactions was also observed in the payment services sector, fiduciaries (trustees) and asset managers. However, a real indicator of a highly developed risk assessment system is the number of suspicious transactions reported on the basis of own assessment rather than on the basis of strict legal provisions. The former type of reports is typical of the financial sector (banks and the payment service sector) and it accounts for one sixth of total reported suspicious transactions over the last eight years. The total number of reports based on own assessment grew in the reference period (2005-2010) due to legislative changes allowing the submission of reports directly to the MROS (the Swiss FIU) and not thanks to the criminal prosecution authorities. We can therefore conclude that the Swiss system for prevention of money laundering and terrorist financing raises the awareness of the non-banking and non-financial sectors, which results in a larger number of suspicious transaction reports coming exactly from these sectors. However, an increase in the number of suspicious transactions reported on the basis of own assessment was also noticed. Furthermore, the above described policy also raises the issue of delivery of information on attempted money laundering, i.e. on funds related to criminal organisations and funds derived from serious crimes, or generated by criminal organisations. This relates to a situation when a transaction has not yet been executed, or a business relationship has not yet been established. In such cases, it is difficult to prove the predicate offence, or initiate criminal proceedings. However, the Swiss Federal Law on Combating Money Laundering in the Financial Sector is primarily a preventive piece of legislation the purpose of which is achieved merely by preventing money launderers from the execution of actual transactions. Although the notifications of unexecuted transactions have not been sent to the MROS, money launderers have still failed to place the funds into the financial system, which markedly limited their activities. France is another good example of the risk-based system implementation. The statistical review of reported suspicious transactions for this country in the period 2005-2010 suggests continued growth in their number. What makes the French system unique and highly effective is the decline in banks' participation in the total number of reported suspicious transactions (although this number has grown from year to year). In 2010, they participated with less than 75% in the total. A marked increase in suspicious transaction reports was observed in authorised exchange offices, due to the growing trade in gold and other precious metals, which is considered a safe investment in times of economic and financial crises. Besides, the increase in this type of transactions may also be due to innovative methods and techniques of money laundering aimed at avoiding the sophisticated anti-money laundering methods employed by the banking sector. An increase in the number of reported suspicious transactions has also been observed in investment firms, financial investment advisers, brokers and portfolio management companies. A clear evidence of effective implementation of the risk assessment system in France is provided in the statistics of non-financial institutions, especially notaries public, auctioneers, casinos, auditors and chartered accountants that suggest sizeable growth of suspicious transactions. Such a statistical analysis shows that money launderers have spared no effort in finding new, innovative ways of legalization of illicitly acquired funds. On the other hand, the French example shows the high awareness and willingness to detect suspicious and illogical transactions in all areas of prevention of money laundering and terrorist financing. A statistical analysis of the Dutch system of prevention of money laundering and terrorist financing also gives positive results. In the Netherlands, suspicious transactions are statistically presented in the system of prevention of money laundering and terrorist financing at two levels: at the level of cash and the level of non-cash suspicious transactions. Despite being mentioned in the Final Study as a country with a falling number of reported suspicious transactions, this fall only relates to cash transfers (which totalled 32,100 and 29,795 in 2009 and 2010 respectively). On the other hand, an increase in the number of reported suspicious transactions, established in the statistical analysis, relates to non-cash transfers (3,453 in 2009 and 4,408 in 2010). In the category of reported suspicious non-cash transactions, the share of banks in the total number of such transactions increased by 28% in 2010 from 2009. The same is true for suspicious transactions reported by casinos and payment card companies (although their relative shares in the total remained unchanged). By contrast, reported transactions involving non-cash transfers trended downwards, particularly in freelance occupations (-14%) and companies providing money transfer services (-19%). This negative trend does not support the implementation of the risk assessment system. Taking also into account the reduced share of banks in the total number of reported suspicious cash transactions, one can conclude that money launderers trying to legalize their illicit earnings increasingly use new technologies available within the financial sector, i.e. they use all forms of fund transfer offered by the modern technology. A statistical analysis of the data on reported suspicious transactions in Germany shows a similar upward trend. In the period 2008-2010, the number of reported suspicious transactions increased, not only in the financial sector but also in insurance companies, tax advising companies, casinos and especially persons involved in trade. Compared with the data on suspicious transactions in Table 1, Germany demonstrates a remarkable level of awareness of all institutions involved in the implementation of the system for prevention of money laundering and terrorist financing, especially those in the non-financial sector. A 22% increase in the number of reported suspicious transactions (in terms of statistics), from 9,046 in 2009 to 11,042 in 2010, was rather insignificant, because almost 20% of transactions reported in the period 2009-2010 related to transfers of illicit funds across bank accounts to third persons and the theft of personal data from email accounts. Viewed from this perspective, the total number of suspicious transaction reports in the period 2007-2010 has not changed significantly. In other words, the application of a prevention strategy to combat money laundering and terrorist financing remained constant, with a slight increase in 2010. The reason for such a modest increase lies entirely in the legislation. The treatment of suspicious transactions is regulated in Article 11 of the German Act on the Detection of Proceeds from Serious Crimes, which provides that, should entities covered by the Act have grounds to believe that (regardless of the amount of a transaction) a crime pursuant to Article 261 of the German Criminal Code (money laundering) or terrorist financing) has been committed or attempted, they should without delay verbally inform the competent authority thereof In order to explain the "borderline of suspicion" in detecting suspicious transactions, the German FIU passed an opinion that covered entities must have knowledge, a suspicion or reasonable suspicion that money laundering or terrorist financing will be attempted or committed. As a result of the said explanation of Article 11 of the German Criminal Code, the number of reported suspicions transactions rose slightly in 2010. However, all this said, and having particularly in mind the relatively small number of reported suspicious transactions, account should be taken of the fact that the German FIU is organised on the model of a police unit, which has certain consequences. Such FIUs are not suitable for direct contacts with non-financial institutions, as they are focused on investigation rather than on prevention measures. For this reason, they are constantly faced with distrust of financial institutions (notably banks), especially with regard to the categorisation of transactions that are not defined by legislation but show inconsistencies in operations. Indeed, such FIUs can be disinclined to "participate actively", as required by financial institutions, especially in those banking systems where the banking secret has traditionally been regulated (Condemi and Pascal, 2005). 5.1.2.2 Serbia, Bulgaria and Liechtenstein Serbia harmonised its legislation with international standards, notably the Third Directive, during 2009. Statistics on reported suspicious transactions (4.537) clearly point to their growth However, it is interesting to note that the bulk of reports come from the financial sector, i.e. banks. Moreover, according to the Annual Report, total number of reported transactions (including cash and suspicious transactions) declined from 2009. As this paper focuses on the value of the definition of suspicious transactions, which reflects itself in practice through statistical data, it is interesting to draw a comparison between the Croatian and Serbian legislations, as their conceptions are very similar, except for the substantial difference in the definitions of suspicious transactions. Despite similarities in the development history of the anti-money laundering legislation and harmonisation with international standards, statistical data show diametrically opposed results in practice. A comparison between the Croatian and Serbian legislations and the statistical data presented in Table 1, some conclusions can be drawn with respect to the implementation of the risk assessment system. The two countries' laws on the prevention of money laundering and terrorist financing do not only bear the same name, but they are also similar in content, although in Croatia, most essential issues are regulated by subordinate legislation (regulations). Nevertheless, there are differences in the treatment of suspicious transactions. Thus, while the Croatian Anti-Money laundering and Terrorist Financing Act provides a very detailed description of a suspicious transaction, there is no definition of this concept in the Serbian law. As concerns the obligation to submit data on suspicious transactions, Article 37 of the Serbian Act only generally lays down this obligation. Moreover, as a result of alignment with international standards and acting in accordance with the provisions of the AMLTFA, Croatia introduced radical changes in the concept of and reporting on suspicious transactions as early as next year (2009). During the reference period (2005-2010), Serbia saw a continuous increase in suspicious transaction reports, suggesting that, despite the new legislation, this country preserved its former principles of operation. In other words, the normative acceptance of a risk-based system was not adequately reflected in practice. Bulgaria also saw an increase in the number of reported suspicious transactions in the period 2005-2010, with a surge recorded in 2010. The number of reported suspicious transactions rose from 883 in 2009 to 1.460 in 2010 (up 60%), exclusively due to a large number of reports coming from heads of Securities Registers and monetary institutions. In the period 2005-2009, banks accounted for as much as 80% of suspicious transaction reports (only 50% in 2010). Monetary institutions participated with 35% in the total number of suspicious transactions in 2010. The numbers of reports from other financial and non-financial institutions remained below average. The last country covered by the statistical analysis of reported suspicious transactions in the period 2005-2010 is Liechtenstein. It appears in Table 1 as a negative example of the risk-based system application, which is not too surprising, given that it was placed on the "blacklist" of non-cooperative countries in 2000. The attitudes of some countries to Liechtenstein in this respect have not changed significantly since then. Slovenia, for example, pursuant to Article 22 and 38 of its Anti-Money Laundering and Terrorist Financing Act, has put this country on a list of countries that pose ML/TF risks. Supporting this attitude is also the fact that the FIU of Liechtenstein (a country with 34, 000 inhabitants and an area of 160 square kilometres) received 261 reports on suspicious transactions (the figure relates to the period ending 1 October 2010). This shows that the increase in the number of reported suspicious transactions in this country, regardless of its compliance with international standards, is by no means the result of the risk-based system implementation. Otherwise, this figure would speak in favour of Slovenia's ranking this country among the high-risk countries with respect to money laundering and terrorist financing. This is confirmed by the fact that the number of cases submitted to the competent authorities for further processing is very close to the number of reported suspicious transactions, which again equals the number of open cases at the FIU of Liechtenstein. 5.2 A brief overview of analysed countries with regard to the risk-based system application As indicated in the Final Study, the upward trend in reported suspicious transactions in some of the observed countries really suggests that effective risk assessment systems are in place. Successful risk categorisation and assessment in Switzerland, France and Germany is reflected not only in a higher total number of reported suspicious transactions but also in the growing participation of the non-banking and non-financial sectors in this upward trend. However, the examples of Serbia and Bulgaria show that only one indicator, in our case the reports on suspicious transactions, is not enough evidence of the risk-based system implementation, because the statistical analyses in these countries have revealed an increase in reported suspicious transactions exclusively in the banking sector. In Croatia, the number of reported suspicious transactions, which is obviously on the decline, also points to effective implementation of the risk-based system. This conclusion is based on the relevant legislation that provides a very detailed description of suspicious transactions, and on the active involvement of reporting entities in the prevention of money laundering and terrorist financing (through the formulation of indicators, education and, finally, being subject to penal provisions). The reports on suspicious transactions have thus gained importance and quality, as shown by the ratio between reported transactions and cases opened by the Office. However, there is still room for improvement. The analyses of reported suspicious transactions for the Netherlands and Slovenia lead to several possible conclusions. Despite irregularities in reporting on suspicious transactions, (variability in the number of reports in the observed period), Slovenia shows an effective application of the risk-based system, given a low number of reported suspicious transactions that always equals the number of open cases at the Slovenian FIU. In the Netherlands, however, cash transactions are strictly separated from non-cash transactions, with a strong increase observed in suspicious non-cash transactions reported by banks, and a decline in the number of suspicious non-cash transactions reported by the non-financial sector. While these data do not corroborate the application of a risk-based system, the situation they describe can still be justified by new trends in money laundering. Regardless of the fall in reported suspicious transactions in Ukraine and a rise in Liechtenstein, the conclusion of the reported suspicious transaction analysis for these two countries is obvious. The excessive total number of reports suggests deficiencies in several areas, from legislation through implementation in practice, which once again confirms that the number of reported suspicious transactions is an inadequate criterion for the efficiency evaluation of a risk assessment system. To sum up, indicators of an efficient a risk-based system application must be sought in multiple areas, separately analysing each particular system for prevention of money laundering and terrorist financing, from the development of legislation to practical measures taken by each individual country. 6 Conclusion Taking into account all efforts to define an effective money laundering prevention system based on risk assessment, comprehensive statistical data, as a reflection of practice, support the following conclusions: An effective risk assessment system requires an appropriate legal framework including a detailed definition of suspicious transactions, efficient supervision and appropriate sanctions in the cases of non-compliance with regulations. A risk assessment system requires that an increasing portion of suspicious transactions be reported by non-financial institutions as evidence of raising awareness in this sector. There is a need for ongoing education of all institutions involved in the implementation of anti-money laundering and terrorist financing measures at the national level. These conclusions have also been supported by the previous statistical analysis of ten countries based on the criterion of an increase vs. decrease in the number of reported suspicious transactions. The effectiveness of a risk assessment system cannot be measured by the number of reported suspicious transactions. While in some countries, such as Switzerland, France, Germany and the Netherlands, such an increase provides evidence of an effective risk assessment system being in place, in others, like Serbia, Bulgaria and Liechtenstein, it proves quite the opposite, even taking into account the organisational differences among the national FIUs. Similarly, a fall in reported suspicious transactions in Croatia, Slovenia or Romania does not mean inadequate application of the risk-based system. On the contrary, by harmonising their respective legislations with the international money laundering and terrorist financing standards, these countries have proved their willingness to reduce the number of reported suspicious transactions, while ensuring high quality of their content. The above analysis clearly demonstrates that informed decisions on a customer's behaviour or on an executed transaction can only be made on the basis of comprehensive legislation, ongoing education, an up-to-date perception of risks and, finally, learning on errors. It follows that the development of any system, including the risk-based system, requires a wide range of information sources and thorough processing of information, as well as a long-standing practice, in order to ensure the best possible interpretation of collected information and its categorisation. The application of such a system provides a basis for further development of operational policies and procedures, while improving the system in order to successfully respond to new challenges on a daily basis. REFERENCES BOOKS AND PUBLICATIONS Cindori, S. (2008): Organizacija financijsko-obavjetajnih jedinica za sprje avanje pranja novca, Zagreb, Hrvatska javna uprava, No.1. Cindori, S. (2010): The Money Laundering Prevention System, Zagreb, Faculty of Law in Zagreb. Condemi, M. and De Pascal, F. (2005): International profiles of the activity to prevent and combat money laundering, Roma, Ufficio italiano dei cambi. Graham, T., Bell, E. and Elliott, N. (2006):  HYPERLINK "http://www.amazon.com/Money-Laundering-Butterworths-Compliance-Graham/dp/0406932484/ref=pd_bbs_11/103-7926034-3998212?ie=UTF8&s=books&qid=1178700903&sr=8-11" Money Laundering (Butterworth's Compliance Series), Wiltshire, Butterworth-Heinemann. Herak, G. (1993):  HYPERLINK "http://knjiznica.pravo.hr/cgi-bin/unilib.cgi?form=D1940225905" Pranje novca i policija, Zagreb,  HYPERLINK "http://knjiznica.pravo.hr/cgi-bin/unilib.cgi?form=D1930303812" Policija i sigurnost - 2(1993), pp. 3-4. Mitsilegas, V. (2003):  HYPERLINK "http://www.amazon.com/Money-Laundering-Counter-Measures-European-Union/dp/9041121315/ref=sr_1_15/103-7926034-3998212?ie=UTF8&s=books&qid=1178700903&sr=8-15" Money Laundering Counter-Measures in the European Union: A New Paradigm of Security Governance Versus Fundamental Legal Principles (European Business Law and Practice), The Hague, Netherlands, Kluwer Law International. Richards, J. (1998):  HYPERLINK "http://www.amazon.com/Transnational-Criminal-Organizations-Cybercrime-Laundering/dp/0849328063/ref=pd_bbs_10/103-7926034-3998212?ie=UTF8&s=books&qid=1178700903&sr=8-10" Transnational Criminal Organizations, Cybercrime, and Money Laundering: A Handbook for Law Enforcement Officers, Auditors and Financial Investigators, Florida, CRC Press LLC. Savona, E. (2004):  HYPERLINK "http://www.amazon.com/Responding-Money-Laundering-International-Perspectives/dp/9057021110/ref=sr_1_44/103-7926034-3998212?ie=UTF8&s=books&qid=1178700983&sr=8-44" Responding to Money Laundering: International Perspectives, London, Harwood Academic Publishers. STUDIES AND GUIDELINES  HYPERLINK "http://ec.europa.eu/internal_market/company/docs/financial-crime/20110124_study_amld_en.pdf" \t "_blank" Final Study on the Application of the Anti-Money Laundering Directive, Service Contract ETD/2009/IM/F2/90, 2009, Brussels, European Commission DG Internal Market and Services Budget. Guidance on the Risk-Based Approach to combating money laundering and terrorist financing, 2007, Paris, Financial Action Task Force. LAWS, REGULATIONS AND DIRECTIVES Act on the Detection of Proceeds from Serious Crimes, August 2008 (Germany). Directives of the European Parliament and of the Council: Directive 91/308/EEC on prevention of the use of the financial system for the purpose of money laundering; Directive 2001/97/EC amending the Directive 91/308/EEC; and Directive 2005/60/EC on the prevention of the use of the financial system for the purpose of money laundering and terrorist financing. Financial Action Task Force on Money Laundering (2012): Methodology for Assessing Compliance with the FATF 40 Recommendations and the FATF 9 Special recommendations. Government Decision no. 594/2008 on the approval of the Regulation for application of the provisions of the Law no. 656/2002 for the prevention and sanctioning money laundering as well as for instituting of some measures for prevention and combating terrorism financing acts (Romania). Law of Ukraine on Prevention and Counteraction to Legalization (Laundering) of the Proceeds from Crime or Terrorist Financing as of 18.05.2010, no 2258. Law no. 656 of December 7th, 2002 on the prevention and sanctioning of money laundering and on setting up of certain measures for the prevention and combating terrorism financing, consequently amended and completed (Romania). Regulations on the Notification of the Anti-Money Laundering Office of Suspicious Transactions and Persons (Croatian version: OG 1/09). The Federal Act onCombating Money Laundering in the Financial Sector (Anti-Money Laundering Act) of 10 October 1997, (Switzerland). Uredba o unutarnjem ustrojstvu Ministarstva financija (NN 29/09). Zakon o prepre evanju pranja denarja in financiranja terorizma, Ur. l. RS, t.  HYPERLINK "http://www.uradni-list.si/1/objava.jsp?urlid=200760&stevilka=3206" \t "_blank" 60/2007,  HYPERLINK "http://www.uradni-list.si/1/objava.jsp?urlid=200947&stevilka=2339" \t "_blank" 47/2009,  HYPERLINK "http://www.uradni-list.si/1/objava.jsp?urlurid=20092424" \t "_blank" 48/2009,  HYPERLINK "http://www.uradni-list.si/1/objava.jsp?urlid=201019&stevilka=808" \t "_blank" 19/2010,  HYPERLINK "http://www.uradni-list.si/1/objava.jsp?urlid=201177&stevilka=3273" \t "_blank" 77/2011. Anti-Money Laundering Act (Croatian version: OG 69/97, 106/97, 67/01, 114/01, 117/03 and 142/03). Anti-Money Laundering and Terrorist Financing Law (Croatian version: OG 87/08); and Zakon o spre avanju pranja novca i finansiranja terorizma ( Slu~beni glasnik RS , nos. 20/09, 72/09 and 91/10). ANNUAL REPORTS Annual report (2010) by the Money Laundering Reporting Office Switzerland (MROS), a publication by the Federal Office of Police, Bern, p. 53; available at: [http://www.fedpol.admin.ch/content/fedpol/en/home/dokumentation/berichte/ geldwaescherei.html]. Federal Criminal Police Office, FIU Germany, Annual Report (2010), Wiesbaden, p. 11; available at: [http://www.bka.de/nn_195184/EN/Publications/ AnnualReportsAndSituationAssessments/FinancialIntelligenceUnitFiuGermany/financialIntelligenceUnitFiuGermany__node.html?__nnn=true]. Annual Reports of the Croatian Ministry of Finance, 2009-2010; available at: [http://www.mfin.hr/hr/godisnjaci-ministarstva]. Progress report and written analysis by the Secretariat of Core Recommendations regarding Croatia (2011), Second 3rd Round Written Progress Report Submitted to MONEYVAL, pp. 220-226; available at: [http://www.coe.int/t/dghl/monitoring/moneyval/Evaluations/Progress%20reports%202y/MONEYVAL(2011)4-rogRep2HRV_en.pdf]. Traitement du renseignement et action contre les circuits financiers clandestins (TRAFCIN), Rapport d`activit (2010), Montreuil-sous-Bois cedex, France, p. 77; available at: [http://www.trafcin.bercy.gouv.fr/pdf/rap2010_ang.pdf]. Izveataj o radu Uprave za spre avanje pranja novca za 2010, Belgrade; available at: [http://www.coe.int/t/dghl/monitoring/moneyval/Evaluations/progress%20reports/MONEYVAL(2010)33ProgRep-SRB_en.pdf]. Main elements related to National Office for Prevention and Control of Money Laundering s activity, performed within the year 2010, Synthesis of the activity report, Bucharest; available at: [http://www.onpcsb.ro/pdf/NOPCML%20Report%202010. pdf]. Poro ilo o delu Urada Republike Slovenije za prepre evanje pranja denarja za leto 2010., Ljubljana; available at: [http://www.uppd.gov.si/si/delovna_podrocja/podatki_o _delu_urada/]. WEBSITES http://ec.europa.eu  HYPERLINK "http://www.apml.org.rs" http://www.apml.org.rs http://www.bka.de http://www.coe.int http://www.fatf-gafi.org  HYPERLINK "http://www.fedpol.admin.ch" http://www.fedpol.admin.ch  HYPERLINK "http://www.onpcsb.ro" http://www.onpcsb.ro.  HYPERLINK "http://www.tracfin.bercy.gouv.fr" http://www.tracfin.bercy.gouv.fr  HYPERLINK "http://www.uppd.gov.si" http://www.uppd.gov.si *The author would like to thank two anonymous referees for their useful comments and suggestions. ** Received: 31 January 2012 Accepted: 18 December 2012 Sonja CINDORI University of Zagreb, Faculty of Law, irilometodska 4, 10000 Zagreb, Croatia e-mail: scindori@pravo.hr The 'risk-based system' is a money laundering prevention system based on risk assessment, as opposed to a 'rule-based system' which relies on strictly defined rules.  The 'rule based system', i.e. a system based on rules was presented in the first two EU directives on prevention of the use of the financial system for money laundering purposes (Directive 91/308/EEC and Directive 2001/97/EC amending the Directive 91/308/EEC).  For more information, see Article 1, item 5 of the Second Directive.  For more information, see Article 22 of the Third Directive.  The Revised Recommendations are available at: [ HYPERLINK "http://www.fatfgafi.org/media/fatf/documents/recommendations/pdfs/FATF%20Recommendations%20" http://www.fatfgafi.org/media/fatf/documents/recommendations/pdfs/FATF%20Recommendations%20 (approved%20February%202012)%20reprint%20May%202012%20web%20version.pdf].  For more information, see Article 4 of the Anti-Money Laundering Act (Croatian version, OG 69/97).  Amendments to the Anti-Money Laundering Act (Croatian version, OG 117/03).  The amendments to the existing Act were in accordance with the international standards then in force, i.e. Article 3, paragraph (8) of the Second Directive, and FATF Recommendations Nos 13 and 11.  For more information, see the Ministry of Finance Annual Reports 2005-2008: [http://www.mfin.hr/hr/godisnjaci-ministarstva] and Moneyval reports: [http://www.coe.int/t/dghl/monitoring/moneyval/Evaluations/Evaluation _reports_en.asp].  Anti-Money Laundering and Terrorist Financing Act (Croatian version, OG 87/08).  For more information, see Article 43 of the AMLTFA.  A definition of suspicious transactions is given in Article 42 of the AMLTFA.  For a full and comprehensive overview, the supervisory authorities cooperate with reporting entities in the compilation of the list of indicators. Similarly, the minister of finance may, in a special rulebook, prescribe mandatory inclusion of particular indicators in the list of indicators for the detection of suspicious transactions and persons in respect of which there are reasons for suspicion of money laundering or terrorist financing. For more information, see Article 41, paragraphs (5) and (6) of the AMLTFA.  Article 8 of the AMLTFA.  A legal person will be fined between HRK 50,000 and HRK 700,000 and a member of the management board or another responsible person of the legal person will be fined between HRK 6, 000 and HRK 30,000. A natural person who is a craftsman or a natural person engaged in another independent activity will be fined between HRK 35,000 and HRK 450,000 for the same violation. For more information, see Article 90 of the AMLTFA.  Exempt from the obligation to report suspicious transactions is a group of professions and occupations, such as lawyers, notaries public, auditors and natural and legal persons providing accounting and tax consulting services, with respect to the information obtained from customers or about customers during the determination of the legal status of a customer or its representation in the court proceedings (including counselling the customer to propose or avoid legal proceedings), regardless of whether the information was obtained or collected before, during or after the proceedings. For more information, see Article 55 of the AMLTFA.  We are talking here about an active role of the reporting entities based on their initiative, as oposed to a passive obligation to submit data additionally requested by the Office (Mitsilegas, 2003).  Should it be necessary to take urgent action to verify data on a suspicious transaction or person, or should the Office deem that there are reasons for suspicion that a transaction or a person is connected with money laundering or terrorist financing, the Office may issue a written order instructing the reporting entity to temporarily suspend the execution of the suspicious transaction for a maximum of 72 hours. The Office will notify the State Attorney's Office and/or the competent State Attorney's Branch Office without delay of the issued orders. For more information, see Article 60 of the AMLTFA.  Exceptionally, the Office may commence the analytical processing of suspicious transactions at a substantiated written proposal of the competent authorities, but only if such activities might be connected with money laundering or terrorist financing. For more information, see Article 64 of the AMLTFA.  The legislative changes led to a restructuring of the Office, i.e. the establishment, among other departments, of a Prevention and Customer Supervision Department and a Strategic Analysis and IT System Department. For more information, see Regulation on the Internal Organisation of the Ministry of Finance (Croatian version: OG 29/09).  There have been similar considerations in the Republic of Croatia long before the introduction of the legislation prescribing anti-money laundering measures. Hrak wrote about linked transactions as far back as 1993, as "large-scale financial operations broken down into a series of smaller transactions in small amounts of money" (Herak, 1993).  Available at: [http://ec.europa.eu/internal_market/company/docs/financial-crime/20110124_study_amld_ en.pdf].  Available at: [http://www.coe.int/t/dghl/monitoring/moneyval/Evaluations/Evaluation _reports_en.asp].  Regulations on the Notification of the Anti-Money Laundering Office of Suspicious Transactions and Persons (Croatian version: OG 1/09).  Entities subject to the measures, actions and procedures for the prevention and detection of money laundering and terrorist financing are specified in Article 4 of the AMLTFA.  The Ministry of Finance Annual Reports for 2009 and 2010; available at: [http://www.mfin.hr/hr/godisnjaci-ministarstva]. Notifications of suspicions of money laundering or terrorist financing in the country or abroad, submitted by the Office to the competent state authorities and the responsible foreign FIU for further processing.  Zakon o prepre evanju pranja denarja in financiranja terorizma, Ur. l. RS, at.  HYPERLINK "http://www.uradni-list.si/1/objava.jsp?urlid=200760&stevilka=3206" \t "_blank" 60/2007; available at: [http://www.uppd.gov.si/si/zakonodaja_in_dokumenti/zppdft_in_podzakonski_akti/].  QRTfghksy{|ð{hS{='*hJh` 56CJOJQJaJmH sH *hJh>56CJOJQJaJmH sH (h_Vh0JCJOJQJaJmH sH $h_VhiCJOJQJaJmH sH 'h_Vh5CJOJQJaJmH sH $h_VhY(aCJOJQJaJmH sH h_Vhi0J\mH sH $h_VhCJOJQJaJmH sH 'h_VhY(a5CJOJQJaJmH sH 'h'h>5CJ OJQJaJ mH sH 'h'h'5CJ OJQJaJ mH sH RSThijk|}~ J $da$gdNNj dgd` dgdY(a $da$gd dgd $da$gdp dgdj|7 p  뫓{iQ9.hJh&6Q0J)56CJOJQJaJmH sH .hJhu0J)56CJOJQJaJmH sH #hJh&6Q0J)6CJaJmH sH .hJh0J)56CJOJQJaJmH sH .hJh^b0J)56CJOJQJaJmH sH .hJh'0J)56CJOJQJaJmH sH 'hJhW6CJOJQJaJmH sH 'hJhu6CJOJQJaJmH sH 'hJh'6CJOJQJaJmH sH  ; A _ k и踠pXD0D'hJh!>6CJOJQJaJmH sH 'hJh j6CJOJQJaJmH sH .hJh` 0J)56CJOJQJaJmH sH .hJh{0J)56CJOJQJaJmH sH .hJh j0J)56CJOJQJaJmH sH .hJhND0J)56CJOJQJaJmH sH .hJhi.0J)56CJOJQJaJmH sH .hJhu0J)56CJOJQJaJmH sH .hJhD(0J)56CJOJQJaJmH sH  / 0  y } ïÛÇs]I5I5'hJhu6CJOJQJaJmH sH 'hJhFh6CJOJQJaJmH sH *hJhK56CJOJQJaJmH sH 'hJh6CJOJQJaJmH sH 'hJh86CJOJQJaJmH sH 'hJhJ6CJOJQJaJmH sH 'hJh\P6CJOJQJaJmH sH 'hJh6CJOJQJaJmH sH 'hJh j6CJOJQJaJmH sH 'hJhD&6CJOJQJaJmH sH  !+-JKNSUegpx}q]I'h_Vh:L5CJOJQJaJmH sH 'h_Vh5CJOJQJaJmH sH 'hJh6CJOJQJaJmH sH 'hJh68B6CJOJQJaJmH sH 'hJhK6CJOJQJaJmH sH 'hJhJ6CJOJQJaJmH sH *hJhK56CJOJQJaJmH sH 'hJhd6CJOJQJaJmH sH 'hJhFh6CJOJQJaJmH sH JKqrEFst}~ $da$gdo$ da$gd2$ >da$gdV*gd7\gd-Q dgd4=PWmpq  )AGhnopϼpppp]p]]D]1jh_Vh20JCJOJQJUaJmH sH $h_VhV*CJOJQJaJmH sH $h_Vh6CJOJQJaJmH sH $h_VhL4CJOJQJaJmH sH $h_VhjCJOJQJaJmH sH $h_VhDCJOJQJaJmH sH $h_VhCJOJQJaJmH sH h_Vh7\mH sH $h_Vh4=PCJOJQJaJmH sH $h_VhCJOJQJaJmH sH pr,MOW]DEFGڴ{hU{UhB/$h_Vh7\CJOJQJaJmH sH $h_VhtCJOJQJaJmH sH $h_Vh-YCJOJQJaJmH sH $h_Vh$ECJOJQJaJmH sH $h_VhFBCJOJQJaJmH sH $h_Vh%CJOJQJaJmH sH $h_VhCJOJQJaJmH sH $h_Vh6_CJOJQJaJmH sH $h_VhD&CJOJQJaJmH sH $h_VhCJOJQJaJmH sH $h_Vh7.CJOJQJaJmH sH GIJMUVijqrstxǴǴ{gTAA.$h_Vh$ECJOJQJaJmH sH $h_Vh?,CJOJQJaJmH sH $h_VheWCJOJQJaJmH sH 'h_Vho5CJOJQJaJmH sH $h_Vh<,CJOJQJaJmH sH $h_Vh` CJOJQJaJmH sH $h_Vh7\CJOJQJaJmH sH $h_VhM1CJOJQJaJmH sH $h_Vh CJOJQJaJmH sH $h_Vh\PCJOJQJaJmH sH $h_Vh*OlCJOJQJaJmH sH t#.2hqu|ڴڡڎ{{h{{UUUU$h_VhKQCJOJQJaJmH sH $h_Vh\PCJOJQJaJmH sH $h_VhCJOJQJaJmH sH $h_VhW6XCJOJQJaJmH sH $h_Vh*OlCJOJQJaJmH sH $h_VhD&CJOJQJaJmH sH $h_VhtCJOJQJaJmH sH $h_VheWCJOJQJaJmH sH $h_Vh?,CJOJQJaJmH sH &'-.?T^_fh{|}~%|uڮuuubuO$h_Vh,uCJOJQJaJmH sH $h_Vh.CJOJQJaJmH sH $h_VhCJOJQJaJmH sH $h_VhEDCJOJQJaJmH sH $h_VheWCJOJQJaJmH sH $h_Vhm72CJOJQJaJmH sH 1jh_Vh:0JCJOJQJUaJmH sH $h_Vh?,CJOJQJaJmH sH $h_Vh:CJOJQJaJmH sH =VYݷ~k~XEX2X2$h_VhBEsCJOJQJaJmH sH $h_Vh`kCJOJQJaJmH sH $h_VhXjCJOJQJaJmH sH $h_VhaCJOJQJaJmH sH $h_VhM2CJOJQJaJmH sH $h_VhvCJOJQJaJmH sH $h_Vhm72CJOJQJaJmH sH $h_VhCJOJQJaJmH sH $h_VhD&CJOJQJaJmH sH $h_Vh,uCJOJQJaJmH sH h_VCJOJQJaJmH sH '+05:rsx:EYgIǴǡǴǴǎڎ{{hU{$h_Vh.CJOJQJaJmH sH $h_Vh{CJOJQJaJmH sH $h_Vhra3CJOJQJaJmH sH $h_VhxCJOJQJaJmH sH $h_VhzlCJOJQJaJmH sH $h_Vh}CJOJQJaJmH sH $h_Vh`CJOJQJaJmH sH $h_VhD&CJOJQJaJmH sH $h_Vh\TYCJOJQJaJmH sH TUnovw ####%%8(9(n+$ da$gdo$ da$gdo & Fgd7\ $da$gd'f & Fgd7\ $da$gdoIQZd%STUZ`mnoڴxdQ>+$h_Vh CJOJQJaJmH sH $h_Vh&qCJOJQJaJmH sH $h_Vh<~CJOJQJaJmH sH 'h_Vh<~6CJOJQJaJmH sH 'h_VhR6CJOJQJaJmH sH 'h_Vh&q6CJOJQJaJmH sH 'h_Vh7\6CJOJQJaJmH sH $h_Vh^CJOJQJaJmH sH $h_VhCJOJQJaJmH sH $h_Vhra3CJOJQJaJmH sH $h_Vh{CJOJQJaJmH sH a",suڴlYYF3$h_Vh@fCJOJQJaJmH sH $h_Vh.~CJOJQJaJmH sH $h_Vh"OCJOJQJaJmH sH $h_Vh<~CJOJQJaJmH sH $h_Vh%>ICJOJQJaJmH sH h_Vhq1OJQJmH sH $h_Vhq1CJOJQJaJmH sH $h_Vh{CJOJQJaJmH sH $h_VhmHCJOJQJaJmH sH $h_Vh CJOJQJaJmH sH $h_VhJCJOJQJaJmH sH uvwz78OWnyڴǡڡڎ{{hhUhBhUh$h_VhCJOJQJaJmH sH $h_Vh7UCJOJQJaJmH sH $h_Vhdm4CJOJQJaJmH sH $h_Vh.~CJOJQJaJmH sH $h_Vh_VCJOJQJaJmH sH $h_Vh"OCJOJQJaJmH sH $h_VhD&CJOJQJaJmH sH $h_VhFCJOJQJaJmH sH $h_Vh@fCJOJQJaJmH sH $h_Vh[v'CJOJQJaJmH sH J Q !!a!!!)"*""Ǵǡ{hUBhB$h_Vh\ CJOJQJaJmH sH $h_Vh'fCJOJQJaJmH sH $h_Vh CJOJQJaJmH sH $h_VhCJOJQJaJmH sH $h_VhCJOJQJaJmH sH $h_Vh$mCJOJQJaJmH sH $h_Vh0_CJOJQJaJmH sH $h_VhD&CJOJQJaJmH sH $h_Vh7UCJOJQJaJmH sH $h_VhCJOJQJaJmH sH """"&#)#########$V$a$z$$$$$%%%%ǴǎzgTggTgTgAg$h_VhHQCJOJQJaJmH sH $h_Vh6CJOJQJaJmH sH $h_Vhf?CJOJQJaJmH sH 'h_Vho5CJOJQJaJmH sH $h_VhoCJOJQJaJmH sH $h_VhCJOJQJaJmH sH $h_Vh@fCJOJQJaJmH sH $h_VhJCJOJQJaJmH sH $h_Vh7UCJOJQJaJmH sH $h_VhRCJOJQJaJmH sH %%6%;%i%q%|%%%%%%%&&\&]&f&g&s&v&'7(8(9((ڴڡڡڎǎǎ{h{h{UBU$h_Vhf?CJOJQJaJmH sH $h_VhCJOJQJaJmH sH $h_Vh^niCJOJQJaJmH sH $h_VherCJOJQJaJmH sH $h_Vhf CJOJQJaJmH sH $h_VhD&CJOJQJaJmH sH $h_Vh0_CJOJQJaJmH sH $h_VhEACJOJQJaJmH sH $h_VhHQCJOJQJaJmH sH $h_VhCJOJQJaJmH sH (())#)()F)M))))***'*~*********+4+e+k+m+Ǵڴ{{g{{{T{T{$h_Vh&GCJOJQJaJmH sH 'h_Vh[06CJOJQJaJmH sH $h_Vh[0CJOJQJaJmH sH $h_VhLCJOJQJaJmH sH $h_VhD&CJOJQJaJmH sH $h_Vh-`gCJOJQJaJmH sH $h_VhCJOJQJaJmH sH $h_VhEACJOJQJaJmH sH $h_Vh$ECJOJQJaJmH sH m+n+o+p+t++++Q,0-5-^-a-t-}---ƲwdQ>Q>Q>+>$h_Vh&GCJOJQJaJmH sH $h_VhVgCJOJQJaJmH sH $h_VheCJOJQJaJmH sH $h_Vh0CJOJQJaJmH sH $h_Vh4=PCJOJQJaJmH sH 'h_Vh4=P6CJOJQJaJmH sH 'h_Vh06CJOJQJaJmH sH 'h_Vh$'6CJOJQJaJmH sH 'h_Vh7\6CJOJQJaJmH sH $h_Vh-`gCJOJQJaJmH sH $h_Vh]-CJOJQJaJmH sH n+o+++--0011N3O36p$ >da$gdm}$ >da$gdWUZ$ >da$gd $a$gd4=P$ >da$gd[ $da$gd4=P$ d^a$gd4=P & FV^`Vgd7\$ >da$gdo ---...../!/a/y/|////0 0D0G0c0z00ǴǴzgTggAgA$h_Vh&GCJOJQJaJmH sH $h_VhD&CJOJQJaJmH sH $h_VhNCJOJQJaJmH sH 'h_Vh1<6CJOJQJaJmH sH $h_Vh1<CJOJQJaJmH sH $h_VhJCJOJQJaJmH sH $h_VhfgCJOJQJaJmH sH $h_VhQ0CJOJQJaJmH sH $h_VhVgCJOJQJaJmH sH $h_Vh0CJOJQJaJmH sH 000000001111f1i1m11111$2(2;222ǴǴǡǴǎڎ{bO{{<$h_VhM!CJOJQJaJmH sH $h_Vh CJOJQJaJmH sH 1jh_VhF!0JCJOJQJUaJmH sH $h_VhfCJOJQJaJmH sH $h_VhMCJOJQJaJmH sH $h_VhD&CJOJQJaJmH sH $h_VhJCJOJQJaJmH sH $h_Vh4=PCJOJQJaJmH sH $h_Vh&GCJOJQJaJmH sH $h_VhY(aCJOJQJaJmH sH 233"3M3N33333J4h44444444444N5q5r555~kXkXkXkkEE$h_Vh7OCJOJQJaJmH sH $h_VhACJOJQJaJmH sH $h_VhwqCJOJQJaJmH sH h_VCJOJQJaJmH sH $h_VhBCJOJQJaJmH sH $h_Vh>CJOJQJaJmH sH $h_VhWUZCJOJQJaJmH sH $h_VhD&CJOJQJaJmH sH $h_VhDCJOJQJaJmH sH $h_VhM!CJOJQJaJmH sH 5555555555555666 6666667tatNt$h_Vhm}CJOJQJaJmH sH $h_VhACJOJQJaJmH sH $h_VhZCJOJQJaJmH sH $h_Vh{/SCJOJQJaJmH sH $h_VhwqCJOJQJaJmH sH $h_Vh7OCJOJQJaJmH sH $h_Vh CJOJQJaJmH sH $h_Vh|oCJOJQJaJmH sH 1jh_Vh|o0JCJOJQJUaJmH sH 66{9|9::);*;;;1=2=@@BBD $a$gdE $a$gd4J $a$gd4=P$d^a$gdsLd d^gd4=P & FgdV@$ da$gdr$ >da$gdm}7.7f7z777777 88&8*88 9=9F9z9{9|99999ǴǴǡڴ{hUB{$h_Vh$ECJOJQJaJmH sH $h_Vh 0;CJOJQJaJmH sH $h_Vh4=PCJOJQJaJmH sH $h_Vh)CJOJQJaJmH sH $h_VhD&CJOJQJaJmH sH $h_VhwqCJOJQJaJmH sH $h_Vh HCJOJQJaJmH sH $h_VhECJOJQJaJmH sH $h_VhZCJOJQJaJmH sH $h_Vh7#CJOJQJaJmH sH 9999::::::::(;*;;;!<$<:<U<`<ڮubbbOO$h_VhoCJOJQJaJmH sH $h_Vh\PCJOJQJaJmH sH $h_VhV@CJOJQJaJmH sH $h_Vh{CJOJQJaJmH sH $h_Vh4=PCJOJQJaJmH sH 1jh_Vhr0JCJOJQJUaJmH sH $h_Vh)CJOJQJaJmH sH $h_Vh7#CJOJQJaJmH sH $h_VhYuCJOJQJaJmH sH `<a<j<l<<<<< =)=1=@=l=m=o=======g>Ӭq^K8^q8qKq$h_VhD&CJOJQJaJmH sH $h_Vh4=PCJOJQJaJmH sH $h_Vh*79CJOJQJaJmH sH $h_VhXhCJOJQJaJmH sH 'h_VhXh6CJOJQJaJmH sH 'h_Vh*796CJOJQJaJmH sH 'h_Vho6CJOJQJaJmH sH $h_Vh)CJOJQJaJmH sH $h_VhoCJOJQJaJmH sH 1jh_Vh4=P0JCJOJQJUaJmH sH g>h>n>r>>>>>>>>>>???'?0?T?U?W?n?x?ڴyfMf:$h_VhD&CJOJQJaJmH sH 1jh_VhDf0JCJOJQJUaJmH sH $h_Vh4=PCJOJQJaJmH sH $h_Vh|pCJOJQJaJmH sH 'h_Vh|p6CJOJQJaJmH sH 'h_Vh}6CJOJQJaJmH sH $h_Vh5[CJOJQJaJmH sH $h_Vh9SLCJOJQJaJmH sH $h_VhXhCJOJQJaJmH sH $h_Vh}CJOJQJaJmH sH x???@@ @}@~@@@@AA+A,A-A5An[H5[$h_Vh|pCJOJQJaJmH sH $h_VhD&CJOJQJaJmH sH $h_Vh9SLCJOJQJaJmH sH 1jh_Vh4=P0JCJOJQJUaJmH sH $h_Vh4$qCJOJQJaJmH sH $h_VhCJOJQJaJmH sH 'h_Vh4=P5CJOJQJaJmH sH $h_Vh4=PCJOJQJaJmH sH 1jh_VhO30JCJOJQJUaJmH sH $h_Vh5[CJOJQJaJmH sH 5A6A>A?AbAcA|AAAAB BBABNBnBxBBBBBBBCCڴڴ{hUBǡ$h_VhQCJOJQJaJmH sH $h_VhECJOJQJaJmH sH $h_VhD&CJOJQJaJmH sH $h_VhB_CJOJQJaJmH sH $h_Vh9SLCJOJQJaJmH sH $h_VhCNCJOJQJaJmH sH $h_Vhy CJOJQJaJmH sH $h_VhsLdCJOJQJaJmH sH $h_Vh4$qCJOJQJaJmH sH $h_Vh4JCJOJQJaJmH sH C"C7C@CLC\C^CmCnCoCqCCCCCCCDDDDDDDDڴ{hYJh_VhOJQJmH sH h_Vh{GOJQJmH sH $h_Vh{GCJOJQJaJmH sH $h_VhL CJOJQJaJmH sH $h_Vh CJOJQJaJmH sH $h_VhCNCJOJQJaJmH sH $h_VhECJOJQJaJmH sH $h_VhD&CJOJQJaJmH sH $h_VhsLdCJOJQJaJmH sH $h_Vh+QCJOJQJaJmH sH DDEFFFnFoF?H@H3L4L_L`LMMOOO$ & F da$gdQF $da$gd4=P $a$gd4J & FV^`Vgda9 $da$gdw & FV^`Vgd7\ $da$gd $a$gdEDD9ExEyEDFEFFFGFKFLFmFnFoFǮڛs_K7$$h_VhwCJOJQJaJmH sH 'h_Vhw6CJOJQJaJmH sH 'h_Vh 6CJOJQJaJmH sH 'h_VhmN6CJOJQJaJmH sH 'h_Vh$'6CJOJQJaJmH sH 'h_Vh7\6CJOJQJaJmH sH $h_VhCJOJQJaJmH sH 1jh_Vhd0JCJOJQJUaJmH sH $h_Vh CJOJQJaJmH sH $h_VhECJOJQJaJmH sH $h_VhBCJOJQJaJmH sH  oFFFFFFFF!G"GH?H I&I/I3IbIkIlIIڴڡڎ{hUhhBhBhB$h_Vh^SNCJOJQJaJmH sH $h_Vh^bCJOJQJaJmH sH $h_Vh2CJOJQJaJmH sH $h_VhfWCJOJQJaJmH sH $h_Vhx[CJOJQJaJmH sH $h_VhV@CJOJQJaJmH sH $h_Vh7\CJOJQJaJmH sH $h_VhQCJOJQJaJmH sH $h_Vh~QCJOJQJaJmH sH $h_Vh CJOJQJaJmH sH IIIIMJJJBKJKKK2L3L4L5L9L?L^LǴǴǡzfR>'h_VhmN6CJOJQJaJmH sH 'h_Vh/56CJOJQJaJmH sH 'h_Vh$'6CJOJQJaJmH sH 'h_Vha96CJOJQJaJmH sH $h_VhwCJOJQJaJmH sH $h_VhNNjCJOJQJaJmH sH $h_Vh&w>CJOJQJaJmH sH $h_VhmNCJOJQJaJmH sH $h_Vh^SNCJOJQJaJmH sH $h_VhD&CJOJQJaJmH sH ^L_L`LtLLLLLL'M(MMMMMMM¯‰vvcPv=v$h_Vh1,CJOJQJaJmH sH $h_VhDCJOJQJaJmH sH $h_VhCJOJQJaJmH sH $h_Vh CJOJQJaJmH sH $h_VhtCJOJQJaJmH sH $h_VhMCJOJQJaJmH sH $h_VhD&CJOJQJaJmH sH $h_VhV@CJOJQJaJmH sH +h_VhNNjCJOJPJQJ\aJmH sH 'h_Vho6CJOJQJaJmH sH MMMMMMMMM6NsN}NOAOQOYO[O`OOOOOOOOOǴǡ{{hUBhU$h_VhCJOJQJaJmH sH $h_VhQFCJOJQJaJmH sH $h_VhHCJOJQJaJmH sH $h_VhDCJOJQJaJmH sH $h_VhMCJOJQJaJmH sH $h_VhI1iCJOJQJaJmH sH $h_VhD&CJOJQJaJmH sH $h_Vh CJOJQJaJmH sH $h_Vh1,CJOJQJaJmH sH $h_VhVCJOJQJaJmH sH O'P+P4P6P;PIPqPrPsPQ'Q,QvQQQQQQڎ{bO<$h_VhTUCJOJQJaJmH sH $h_Vh4=PCJOJQJaJmH sH 1jh_Vh0JCJOJQJUaJmH sH $h_VhD&CJOJQJaJmH sH $h_VhE9CJOJQJaJmH sH $h_VhZCJOJQJaJmH sH $h_VhQFCJOJQJaJmH sH $h_VhVCJOJQJaJmH sH $h_Vh#CJOJQJaJmH sH $h_VhHCJOJQJaJmH sH O;PrPsPQQNTOTxTyTHWIWkZlZ]]]]` & Fr^`rgda94gdn4`gdV $da$gd4=P $da$gd2 $da$gd2} $da$gdZ$ & F da$gdQFQQQQ+R1R>RBRLRRRRSS2S5SLSSSSSJTKTOTSTVTwTyTڴڛt`tL'h_Vha95CJOJQJaJmH sH 'h_Vh/55CJOJQJaJmH sH 'h_Vh_k5CJOJQJaJmH sH $h_Vh2CJOJQJaJmH sH 1jh_Vh20JCJOJQJUaJmH sH $h_VhDCJOJQJaJmH sH $h_Vh6<CJOJQJaJmH sH $h_Vh_kCJOJQJaJmH sH $h_VhdCJOJQJaJmH sH yTTTUU U"UFUOUVUUUUUUUUUVVV"V9V:VVǮ|cJc|JJJc0h_Vh-CJOJPJQJaJmH nHsH tH0h_Vh3aCJOJPJQJaJmH nHsH tH0h_VhACJOJPJQJaJmH nHsH tH0h_VhxCJOJPJQJaJmH nHsH tH0h_VhxBoCJOJPJQJaJmH nHsH tH$h_VhxBoCJOJQJaJmH sH $h_Vh3aCJOJQJaJmH sH $h_Vh,CJOJQJaJmH sH VW W/W2WGWHWIWWW XyXzXYY8Z^Z_ZhZ硎{h{U{UBUB/B$h_VhNCJOJQJaJmH sH $h_Vh `CJOJQJaJmH sH $h_VhJiBCJOJQJaJmH sH $h_VhD&CJOJQJaJmH sH $h_VhsCJOJQJaJmH sH $h_VhKt:CJOJQJaJmH sH 'h_Vh,5CJOJQJaJmH sH 0h_VhD&CJOJPJQJaJmH nHsH tH0h_VhxCJOJPJQJaJmH nHsH tH0h_VhYCJOJPJQJaJmH nHsH tHhZiZjZkZlZZZZ%[+[b[h[[[[[\\\\\\\\\\B]C]_]`]i]ӭtaaaaaaaaNNN$h_Vh==CJOJQJaJmH sH $h_VhNCJOJQJaJmH sH $h_VhD&CJOJQJaJmH sH $h_VhHCJOJQJaJmH sH $h_Vh(CJOJQJaJmH sH $h_Vh `CJOJQJaJmH sH $h_VhKt:CJOJQJaJmH sH $h_Vh~CJOJQJaJmH sH 1jh_Vh~0JCJOJQJUaJmH sH i]r]}]~]]]]]]]]]t`L5,h_Vh?3?CJOJQJaJmH nHsH tH,h_Vh%CJOJQJaJmH nHsH tH'h_Vho6CJOJQJaJmH sH 'h_VhJ=6CJOJQJaJmH sH 'h_Vha96CJOJQJaJmH sH $h_Vh2}CJOJQJaJmH sH $h_Vh~CJOJQJaJmH sH $h_VhsCJOJQJaJmH sH 1jh_Vhs0JCJOJQJUaJmH sH $h_Vh==CJOJQJaJmH sH $h_VhD&CJOJQJaJmH sH  ]]S^Y^|^__=_>______```һtt]t@9jh_Vh- 0JCJOJQJUaJmH nHsH tH,h_VhNNjCJOJQJaJmH nHsH tH,h_VhD_CJOJQJaJmH nHsH tH,h_Vh4=PCJOJQJaJmH nHsH tH1jh_Vh- 0JCJOJQJUaJmH sH ,h_Vh-CJOJQJaJmH nHsH tH,h_Vh?3?CJOJQJaJmH nHsH tH,h_VhCJOJQJaJmH nHsH tH`~``````aaaabb鹢tatJt7$h_Vh4=PCJOJQJaJmH sH ,h_VhB_CJOJQJaJmH nHsH tH$h_Vh3CJOJQJaJmH sH ,h_Vh3CJOJQJaJmH nHsH tH,h_VhnCJOJQJaJmH nHsH tH,h_Vh4=PCJOJQJaJmH nHsH tH1jh_VhYs%0JCJOJQJUaJmH sH ,h_VhCJOJQJaJmH nHsH tH,h_Vh!CJOJQJaJmH nHsH tH ``cccc`eaeggjjll$p%pZr[rr & FgdJ(d $da$gdm&$ >da$gd_ $da$gd% $da$gduS & Fr^`rgda9 $da$gd4=PbbbEbSbZbabdbebbbb&cFcKcOcXc]c^cgcqcctaN;N$h_Vh_VCJOJQJaJmH sH $h_VhVCJOJQJaJmH sH $h_Vh1vCJOJQJaJmH sH $h_VhD&CJOJQJaJmH sH $h_VhCpCJOJQJaJmH sH $h_Vhg*CJOJQJaJmH sH $h_Vh-CJOJQJaJmH sH $h_VhdxCJOJQJaJmH sH $h_Vh4=PCJOJQJaJmH sH 1jh_Vh4=P0JCJOJQJUaJmH sH cccccccccccct`L8%$h_Vh$CJOJQJaJmH sH 'h_Vh%,6CJOJQJaJmH sH 'h_Vh 6CJOJQJaJmH sH 'h_VhB_6CJOJQJaJmH sH 'h_Vha96CJOJQJaJmH sH $h_Vh p(CJOJQJaJmH sH $h_Vh4=PCJOJQJaJmH sH $h_Vh_CJOJQJaJmH sH 1jh_Vhj0JCJOJQJUaJmH sH $h_Vh1vCJOJQJaJmH sH $h_Vh$CJOJQJaJmH sH  cdtd|d}dddddddFe^e_eae~eeeeeeee fڴڴڠڌyfySy@@$h_VhCJOJQJaJmH sH $h_Vh0-aCJOJQJaJmH sH $h_Vh_ZCJOJQJaJmH sH $h_Vhx[CJOJQJaJmH sH 'h_Vh 6CJOJQJaJmH sH 'h_Vh$6CJOJQJaJmH sH $h_VhSCJOJQJaJmH sH $h_VhnCJOJQJaJmH sH $h_Vh$CJOJQJaJmH sH $h_VhkmvCJOJQJaJmH sH  ff,f4f5f6f9fLfTflfmfpfufvfffffffffffff$g9ghgjgtggggg.hڡڡڡ{{h{{$h_Vhx[CJOJQJaJmH sH $h_Vh]ZCJOJQJaJmH sH $h_Vh^WCJOJQJaJmH sH $h_VhCJOJQJaJmH sH $h_VhUCJOJQJaJmH sH $h_VhSCJOJQJaJmH sH $h_VhCJOJQJaJmH sH $h_VhlCJOJQJaJmH sH #.hhhhi ioiriiiiiijj7j?jYj[jjjjjjjjPkǴǡǡǎ{ڡhhUh$h_Vh]ZCJOJQJaJmH sH $h_Vh+CJOJQJaJmH sH $h_VhD&CJOJQJaJmH sH $h_VhY-CJOJQJaJmH sH $h_Vh-CJOJQJaJmH sH $h_Vh^WCJOJQJaJmH sH $h_VhCJOJQJaJmH sH $h_VhMICJOJQJaJmH sH $h_Vh )CJOJQJaJmH sH Pkkkkkkkkkkkll l=lElOlnllllllll-mCmSmpmǴǡǎ{hhUhU$h_VhKbCJOJQJaJmH sH $h_Vh6CJOJQJaJmH sH $h_Vh+CJOJQJaJmH sH $h_VhNWCJOJQJaJmH sH $h_Vh{LCJOJQJaJmH sH $h_VhD&CJOJQJaJmH sH $h_VhUCJOJQJaJmH sH $h_VhMICJOJQJaJmH sH $h_VhnCJOJQJaJmH sH pmmmmmmmmmn n nn#n dgdJ & Fr^`rgda9 $da$gdG{ $da$gd$ $da$gdUn.t3t4t5tttttttttttuuuuu7udueufuhu{h{h{h{UA'h_Vha96CJOJQJaJmH sH $h_VhJCJOJQJaJmH sH $h_VhG{CJOJQJaJmH sH $h_VhJ(dCJOJQJaJmH sH $h_VhBn?CJOJQJaJmH sH $h_VhD&CJOJQJaJmH sH $h_Vh;iCJOJQJaJmH sH $h_VhDblCJOJQJaJmH sH $h_VhDRCJOJQJaJmH sH $h_Vh]CJOJQJaJmH sH huluruuuuuuuuuvgvrvvv믜vcvP71jh_VhT0JCJOJQJUaJmH sH $h_VhD&CJOJQJaJmH sH $h_Vh3)CJOJQJaJmH sH $h_VhV-CJOJQJaJmH sH $h_VhICJOJQJaJmH sH $h_VhJCJOJQJaJmH sH 'h_Vh$6CJOJQJaJmH sH 'h_Vha96CJOJQJaJmH sH 'h_VhaJ6CJOJQJaJmH sH 'h_VhJ(d6CJOJQJaJmH sH vvvvvvvwwwxwwxbxrxxxxxxxyyCyKyLyMyNyǴڡ{hU{U{UB{U{U{U{$h_VhoCJOJQJaJmH sH $h_VhtCJOJQJaJmH sH $h_Vh;"CJOJQJaJmH sH $h_Vh.kCJOJQJaJmH sH $h_VhaJCJOJQJaJmH sH $h_Vh3)CJOJQJaJmH sH $h_Vh_QCJOJQJaJmH sH $h_VhMCJOJQJaJmH sH $h_VhICJOJQJaJmH sH $h_VhK CJOJQJaJmH sH NyOyyz zjzvzzzzzzz{ {{{{{{{{{>{?{A{ǴǴǡ{{l\LA\LAlh_Vh1mH sH h_Vh15OJQJmH sH h_Vh=D5OJQJmH sH h_Vh1OJQJmH sH $h_Vh=DCJOJQJaJmH sH $h_Vh(CCJOJQJaJmH sH $h_VhrCJOJQJaJmH sH $h_VhD&CJOJQJaJmH sH $h_Vh"iCJOJQJaJmH sH $h_VhtCJOJQJaJmH sH $h_VhJCJOJQJaJmH sH {{{ {%{*{/{4{9{>{?{hcFfkd$$Ifl"0# t0N644 lalp$d$Ifa$gd# A{G{H{P{S{T{W{d{e{h{i{o{r{s{t{y{z{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{||||||||)|*|5|ϻϻϧϧϜ⻧⧻ϧϻϧϻϻϜϻϻh_Vh1mH sH 'h_Vh-:aCJOJQJ\aJmH sH 'h_Vh1CJOJQJ\aJmH sH $h_Vh1CJOJQJaJmH sH h_Vh1OJQJmH sH h_Vh=DOJQJmH sH =?{H{P{T{X{d{i{s{t{{{{{{{{{{{{{{FfFfd$Ifgd#$d$Ifa$gd#$d$Ifa$gdo$d$Ifa$gdo{{{||||*|6|C|O|[|\|d|p|y||||||||FfOFf:$d$Ifa$gdo d$Ifgd#Ff% d$Ifgd#5|6|B|C|N|O|Z|[|\|c|d|l|p|u||||||||||||||||||||||||||||||||||οٜٜٜٜٜΰٜv$h_Vh-:aCJOJQJaJmH sH $h_VhCJOJQJaJmH sH 'h_Vh-:aCJOJQJ\aJmH sH h_Vh1OJQJmH sH h_Vh#OJQJmH sH h_Vh1mH sH 'h_Vh1CJOJQJ\aJmH sH $h_Vh1CJOJQJaJmH sH .||||||||}}}'}3}>}?}F}S}^}i}t}}}}}}FfFfy$d$Ifa$gdoFfdd$Ifgd#|||} }}>}?}@}A}F}R}S}Z}^}e}h}i}p}s}t}z}{}~}}}}}}}}}}}}}}}}λΝΨΨΨΉΨΉuuaΉ'h_Vh p(CJOJQJ\aJmH sH 'h_VhCJOJQJ\aJmH sH 'h_Vh-:aCJOJQJ\aJmH sH h_Vh1mH sH $h_Vh1CJOJQJaJmH sH $h_Vh p(CJOJQJaJmH sH 'h_Vh1CJOJQJ\aJmH sH h_Vh1OJQJmH sH h_Vh#OJQJmH sH &}}}}}}}}}}~ ~~~~~e~f~~~~. & Fgd#gd_ dgdJFf $d$Ifa$gdoFfd$Ifgd#}}}}}}}}}}}}}}}}}}~~~~~ ~ ~~~~~~~~~~̽뇚뇚s`$h_VhpCJOJQJaJmH sH 'h_VhCJOJQJ\aJmH sH $h_Vh1CJOJQJaJmH sH 'h_Vh p(CJOJQJ\aJmH sH h_Vh1OJQJmH sH h_Vh#OJQJmH sH h_Vh1mH sH 'h_Vh-:aCJOJQJ\aJmH sH 'h_Vh1CJOJQJ\aJmH sH !~%~&~/~0~K~L~d~e~f~h~o~~~~~~~~~~~Ǯ훋{k{[kK{K[K[<h_Vh9OJQJmH sH h_Vh#6OJQJmH sH h_Vh_6OJQJmH sH h_Vh_V6OJQJmH sH h_VhD&6OJQJmH sH h_Vh926OJQJmH sH $h_VhJCJOJQJaJmH sH 1jh_Vh(C0JCJOJQJUaJmH sH $h_Vh(CCJOJQJaJmH sH $h_VhrCJOJQJaJmH sH $h_Vh#CJOJQJaJmH sH ~~-.0x9ENOQRSbcdɀdzڠzgT@-$h_Vh%CJOJQJaJmH sH 'h_Vh~a5CJOJQJaJmH sH $h_Vh#CJOJQJaJmH sH $h_Vh"CJOJQJaJmH sH $h_Vh8.CJOJQJaJmH sH $h_VhD&CJOJQJaJmH sH $h_Vh%CJOJQJaJmH sH 'h_VhP>5CJOJQJaJmH sH $h_Vh*CJOJQJaJmH sH $h_Vh#CJOJQJaJmH sH $h_Vha9CJOJQJaJmH sH .0ORcdJKmnKLȋʋˋKL $da$gd $da$gd*&$[$\$a$gdg $da$gd=> $da$gd~a & F8^8`gda9$d^a$gdVEɀрӀԀ>BVYpsǁKO`jƂǂ"-[bǴǡǎ{{{{h{h{hhhUh$h_VhV CJOJQJaJmH sH $h_Vh0^fCJOJQJaJmH sH $h_VhaCJOJQJaJmH sH $h_VhD&CJOJQJaJmH sH $h_VhoCJOJQJaJmH sH $h_Vh;"CJOJQJaJmH sH $h_Vh%CJOJQJaJmH sH $h_Vh._CJOJQJaJmH sH $h_Vh~aCJOJQJaJmH sH >HOQvKNln}ڴڙq^K^q;h_Vh5CJaJmH sH $h_VhtCJOJQJaJmH sH $h_VhCJOJQJaJmH sH 'h_Vh=>5CJOJQJaJmH sH 'h_Vh3k5CJOJQJaJmH sH 4jh_Vh._0J5CJOJQJUaJmH sH $h_VhV CJOJQJaJmH sH $h_Vh<CJOJQJaJmH sH $h_Vh=>CJOJQJaJmH sH $h_VhpGCJOJQJaJmH sH }~ąDžy+│ψψqaQaQAQAQh_VhD&5CJaJmH sH h_VhiJ5CJaJmH sH h_VhA>g5CJaJmH sH ,jh_Vhg0J5CJUaJmH sH h_Vhg5CJaJmH sH h_Vh3k5CJaJmH sH ,jh_Vh3k0J5CJUaJmH sH h_Vh:5CJaJmH sH h_VhD5CJaJmH sH h_Vh5CJaJmH sH h_Vht5CJaJmH sH +>IJLl@t*/67ϿxhXXhHXHXHXHh_VhY85CJaJmH sH h_VhkO95CJaJmH sH h_Vh5<5CJaJmH sH h_VhD&5CJaJmH sH h_Vhb 5CJaJmH sH ,jh_Vhf;0J5CJUaJmH sH h_Vh 5CJaJmH sH h_Vhs5CJaJmH sH h_Vh!5CJaJmH sH h_VhiJ5CJaJmH sH h_Vhxf5CJaJmH sH 78:mnvw{Njȋɋʋˋ̋ۋ܋￯lYlFlY$h_Vhi <CJOJQJaJmH sH $h_Vh*CJOJQJaJmH sH $h_Vh,CJOJQJaJmH sH $h_Vha9CJOJQJaJmH sH h_VhF5CJaJmH sH h95CJaJmH sH h_Vhxf5CJaJmH sH h_Vh>5CJaJmH sH h_VhkO95CJaJmH sH h_VhY85CJaJmH sH h_Vh8vt5CJaJmH sH EVv#$7[\؍ލ'ıx_xL9x9x9x9x9x$h_Vh/CJOJQJaJmH sH $h_VhCJOJQJaJmH sH 1jh_Vh0JCJOJQJUaJmH sH $h_VhCJOJQJaJmH sH $h_Vh[6CJOJQJaJmH sH $h_Vhl!CJOJQJaJmH sH $h_Vh,CJOJQJaJmH sH $h_Vh*CJOJQJaJmH sH 'h_Vh*6CJOJQJaJmH sH 'h_Vh*5CJOJQJaJmH sH 'YZy>E ;>?ǴǴǴǡǎ{hU$h_VhjCJOJQJaJmH sH $h_Vh[CJOJQJaJmH sH $h_Vh"I3CJOJQJaJmH sH $h_VhICJOJQJaJmH sH $h_VhGrCJOJQJaJmH sH $h_Vh[6CJOJQJaJmH sH $h_Vh;CJOJQJaJmH sH $h_Vh/CJOJQJaJmH sH $h_Vh/CJOJQJaJmH sH ?@DEFGƑ >IKLPڮuubuN;$h_Vhi1CJOJQJaJmH sH 'h_Vh*5CJOJQJaJmH sH $h_VhD&CJOJQJaJmH sH $h_VhEmCJOJQJaJmH sH $h_Vhf;CJOJQJaJmH sH $h_Vh .CJOJQJaJmH sH $h_Vha9CJOJQJaJmH sH 1jh_Vh[0JCJOJQJUaJmH sH $h_Vh[CJOJQJaJmH sH $h_VhfRCJOJQJaJmH sH PahipȓΓ Ҕהٔ *8ƳƍzzzgTzgzA$h_Vhy\CJOJQJaJmH sH $h_Vhe)CJOJQJaJmH sH $h_VhD&CJOJQJaJmH sH $h_Vh&uCJOJQJaJmH sH $h_VhyCJOJQJaJmH sH $h_VheCJOJQJaJmH sH $h_VhfRCJOJQJaJmH sH $h_Vh&@CJOJQJaJmH sH 'h_Vhm6CJOJQJaJmH sH $h_VhmCJOJQJaJmH sH 89:NSo~ !&0kn{ϖttttttaN$h_VhJCJOJQJaJmH sH $h_Vh(d/CJOJQJaJmH sH $h_Vh6xCJOJQJaJmH sH $h_VhQCJOJQJaJmH sH $h_Vhi1CJOJQJaJmH sH $h_VhD&CJOJQJaJmH sH $h_Vhy\CJOJQJaJmH sH $h_Vhe)CJOJQJaJmH sH 1jh_VhQ0JCJOJQJUaJmH sH LGHefޟߟ,- $da$gdn@q $da$gdQPgd5v  & F8^8gd6i $da$gd~E dgdJ & FgdK $da$gd*ϖז+ChޗMNsvŲŲŲ|iVC$h_Vh_CJOJQJaJmH sH $h_VhQCJOJQJaJmH sH $h_VhD&CJOJQJaJmH sH h_VCJOJQJaJmH sH $h_Vh`CJOJQJaJmH sH $h_Vhi1CJOJQJaJmH sH $h_Vh;jCJOJQJaJmH sH $h_VhYCJOJQJaJmH sH $h_VhJCJOJQJaJmH sH 'h_VhJ6CJOJQJaJmH sH ܘSrwCDEFHYc9GdڴǡubObObOCJOJQJaJmH sH $h_VhD&CJOJQJaJmH sH $h_VhJCJOJQJaJmH sH $h_VhP>CJOJQJaJmH sH $h_Vh8vtCJOJQJaJmH sH $h_VhK CJOJQJaJmH sH $h_Vha9CJOJQJaJmH sH $h_VhKCJOJQJaJmH sH  Es۟ߟ%&AEnڴڡڡo\I\I6$h_VhiCJOJQJaJmH sH $h_VhY<CJOJQJaJmH sH $h_Vh-CJOJQJaJmH sH $h_Vh=CJOJQJaJmH sH 'h_Vh6i6CJOJQJaJmH sH h_Vh5vmH sH $h_VhJCJOJQJaJmH sH $h_Vh>CJOJQJaJmH sH $h_VhD&CJOJQJaJmH sH $h_Vh6iCJOJQJaJmH sH $h_VhoCJOJQJaJmH sH  !#=E]guubOOOO$h_Vh%CJOJQJaJmH sH $h_Vh$ECJOJQJaJmH sH $h_Vh=CJOJQJaJmH sH $h_Vh"CJOJQJaJmH sH $h_VhD&CJOJQJaJmH sH $h_VhY<CJOJQJaJmH sH $h_VhQPCJOJQJaJmH sH 1jh_VhQP0JCJOJQJUaJmH sH $h_VhiCJOJQJaJmH sH +,-̦ѦڦۦǴǡ{hUUB/$h_VhFCJOJQJaJmH sH $h_Vh"CJOJQJaJmH sH $h_Vh"PCJOJQJaJmH sH $h_VhD&CJOJQJaJmH sH $h_Vh4CJOJQJaJmH sH $h_Vhn@qCJOJQJaJmH sH $h_Vh:CJOJQJaJmH sH $h_VhJCJOJQJaJmH sH $h_Vh3&`CJOJQJaJmH sH $h_VhR@VCJOJQJaJmH sH $h_Vh_CJOJQJaJmH sH )89Zels2345BCJSYOPǴǡLjubǡOǴ<$h_VhCJOJQJaJmH sH $h_VhD&CJOJQJaJmH sH $h_Vh2FCJOJQJaJmH sH $h_VhBCCJOJQJaJmH sH 1jh_Vhc0JCJOJQJUaJmH sH $h_Vh"PCJOJQJaJmH sH $h_Vh'%CJOJQJaJmH sH $h_Vh4CJOJQJaJmH sH $h_VhFCJOJQJaJmH sH $h_Vh:CJOJQJaJmH sH  39[\^epuڴǡǎ{hTA$h_Vh@CJOJQJaJmH sH 'h_Vh 6CJOJQJaJmH sH $h_Vh4CJOJQJaJmH sH $h_Vh8XCJOJQJaJmH sH $h_Vh CJOJQJaJmH sH $h_VhD&CJOJQJaJmH sH $h_VhR@VCJOJQJaJmH sH $h_VhCJOJQJaJmH sH $h_Vh'%CJOJQJaJmH sH $h_Vh"PCJOJQJaJmH sH ]^ DXYE & F8^8`gdoR  & F8^8gdrA $da$gdB\ $da$gd $da$gd{? $da$gd3 $da$gdn@qqtu}̫ͫ biڴ{{h{{U{U{B$h_VhTJCJOJQJaJmH sH $h_VhD&CJOJQJaJmH sH $h_Vh8XCJOJQJaJmH sH $h_Vh:CJOJQJaJmH sH $h_VhCJOJQJaJmH sH $h_Vh"CJOJQJaJmH sH $h_Vh@CJOJQJaJmH sH $h_VhY<CJOJQJaJmH sH $h_Vh CJOJQJaJmH sH $h_VhMCJOJQJaJmH sH i| ʰCǴڡuubbbObOb<$h_Vh~CJOJQJaJmH sH $h_VhD&CJOJQJaJmH sH $h_Vh*CJOJQJaJmH sH $h_Vh<CJOJQJaJmH sH 1jh_VhQu0JCJOJQJUaJmH sH $h_Vh,tCJOJQJaJmH sH $h_VhCJOJQJaJmH sH $h_Vh@CJOJQJaJmH sH $h_VhTJCJOJQJaJmH sH $h_Vh:CJOJQJaJmH sH CDFZɱٱ )_cdk{8:EF[dڴڠڴzzgTzTzTz$h_VhpCJOJQJaJmH sH $h_VhqCJOJQJaJmH sH $h_VhPCJOJQJaJmH sH $h_VhwCJOJQJaJmH sH 'h_Vh~6CJOJQJaJmH sH $h_Vh6%CJOJQJaJmH sH $h_VhD&CJOJQJaJmH sH $h_Vh~CJOJQJaJmH sH $h_Vh,tCJOJQJaJmH sH  *AB4:esx%15Ǵǡǎǎǎ{hU{U{{$h_VhqCJOJQJaJmH sH $h_VhJCJOJQJaJmH sH $h_VhhnCJOJQJaJmH sH $h_VhHf|CJOJQJaJmH sH $h_Vh}P!CJOJQJaJmH sH $h_VhUlCJOJQJaJmH sH $h_VhCJOJQJaJmH sH $h_VhPCJOJQJaJmH sH $h_VhD&CJOJQJaJmH sH 5=@Binr89YZ]46|ز،yfS@fSfS@S$h_VhCJOJQJaJmH sH $h_Vh8lCJOJQJaJmH sH $h_Vh;)NCJOJQJaJmH sH $h_VhD&CJOJQJaJmH sH $h_VhOgCJOJQJaJmH sH $h_VhaxtCJOJQJaJmH sH $h_VhfRCJOJQJaJmH sH $h_VhqCJOJQJaJmH sH $h_VhhnCJOJQJaJmH sH 'h_Vhhn6CJOJQJaJmH sH |4ADWǮubO<)<$h_Vh0CJOJQJaJmH sH $h_Vh_BCJOJQJaJmH sH $h_VhCJOJQJaJmH sH $h_VhD&CJOJQJaJmH sH $h_VhoRCJOJQJaJmH sH $h_Vh*7CJOJQJaJmH sH $h_VhVHCJOJQJaJmH sH 1jh_VhP|0JCJOJQJUaJmH sH $h_Vh CJOJQJaJmH sH $h_VhqCJOJQJaJmH sH $h_VhN8cCJOJQJaJmH sH |}~ǽнؽٽ%lprr^^^J^J6'h_VhqCJOJQJ\aJmH sH 'h_Vh"?CJOJQJ\aJmH sH 'h_Vh[cCJOJQJ\aJmH sH 'h_Vh CJOJQJ\aJmH sH 'h_Vh CJOJQJ\aJmH sH 'h_Vh0CJOJQJ\aJmH sH $h_VhRCJOJQJaJmH sH 1jh_VhR0JCJOJQJUaJmH sH $h_VhqxCJOJQJaJmH sH $h_Vh0CJOJQJaJmH sH ɾ߾ƿϿ)*ïtataNa;N$h_VhdCJOJQJaJmH sH $h_Vh_CJOJQJaJmH sH $h_Vh8?CJOJQJaJmH sH $h_Vh!$aCJOJQJaJmH sH 'h_Vh!$aCJOJQJ\aJmH sH 'h_VhD&CJOJQJ\aJmH sH 'h_Vh CJOJQJ\aJmH sH 'h_Vh CJOJQJ\aJmH sH 'h_VhthCJOJQJ\aJmH sH 'h_Vh"?CJOJQJ\aJmH sH 14HXb#&)*34tuǡڴڎ{{l{YF$h_VhoRCJOJQJaJmH sH $h_Vh!$aCJOJQJaJmH sH h_VhrAOJQJmH sH $h_VhrACJOJQJaJmH sH $h_VhDI CJOJQJaJmH sH $h_VhGtCJOJQJaJmH sH $h_Vht;8CJOJQJaJmH sH $h_Vhjj@CJOJQJaJmH sH $h_Vh_CJOJQJaJmH sH $h_VhdCJOJQJaJmH sH !"&+02CDFGLM{=rdzyffMffyf1jh_Vh0JCJOJQJUaJmH sH $h_Vhr!CJOJQJaJmH sH $h_Vht;8CJOJQJaJmH sH $h_VhD&CJOJQJaJmH sH 'h_VhD&6CJOJQJaJmH sH 'h_Vh6CJOJQJaJmH sH $h_VhJCJOJQJaJmH sH $h_VhCJOJQJaJmH sH $h_VhrACJOJQJaJmH sH EF)*fgKL $da$gd/of $da$gd]"$ & Fa$gd]"gd7s & Fr^`rgdoR $da$gd } $da$gd dgdJrP7BCXimJPu~Ǵǡǎǎ{hhUUBUU$h_Vh@CJOJQJaJmH sH $h_VhRlCJOJQJaJmH sH $h_Vh CJOJQJaJmH sH $h_Vh}P!CJOJQJaJmH sH $h_VhCJOJQJaJmH sH $h_VhD&CJOJQJaJmH sH $h_Vh= _CJOJQJaJmH sH $h_Vh`CJOJQJaJmH sH $h_Vhr!CJOJQJaJmH sH $h_Vh9'CJOJQJaJmH sH GJZ[ :DgzfS@$h_VhZCJOJQJaJmH sH $h_VhvCJOJQJaJmH sH 'h_VhZ6CJOJQJaJmH sH 'h_Vhv6CJOJQJaJmH sH $h_VhRlCJOJQJaJmH sH $h_Vh"]CJOJQJaJmH sH $h_Vh@CJOJQJaJmH sH $h_VhZCJOJQJaJmH sH $h_VhaCJOJQJaJmH sH $h_VhCxCJOJQJaJmH sH !"*56<@CHZ[,-TVefgǴ{h{UU{B$h_VhHG_CJOJQJaJmH sH $h_Vh!5CJOJQJaJmH sH $h_VhsCJOJQJaJmH sH $h_VhZCJOJQJaJmH sH $h_VhvCJOJQJaJmH sH $h_VhyDWCJOJQJaJmH sH $h_VhfRCJOJQJaJmH sH $h_VhD&CJOJQJaJmH sH $h_Vh-'CJOJQJaJmH sH $h_Vh"]CJOJQJaJmH sH (.::OYrdzǠǍzzgzzzTATATA$h_Vhw9CJOJQJaJmH sH $h_VhGdCJOJQJaJmH sH $h_VhD&CJOJQJaJmH sH $h_VhPwyCJOJQJaJmH sH $h_VhmHCJOJQJaJmH sH $h_VhHG_CJOJQJaJmH sH 'h_Vh-'6CJOJQJaJmH sH $h_Vh-'CJOJQJaJmH sH $h_Vh-CJOJQJaJmH sH $h_VhCJOJQJaJmH sH r8BǮubuOu<<$h_VhsCJOJQJaJmH sH $h_Vhd9CJOJQJaJmH sH $h_VhmHCJOJQJaJmH sH $h_Vhd4CJOJQJaJmH sH $h_VhD&CJOJQJaJmH sH $h_VhyDWCJOJQJaJmH sH 1jh_Vhoy0JCJOJQJUaJmH sH $h_VhoyCJOJQJaJmH sH $h_Vh$ECJOJQJaJmH sH $h_VhCJOJQJaJmH sH .0JLNڴxdP<-h_Vh7smH nHsH tH'h_VhM,6CJOJQJaJmH sH 'h_Vh}P!6CJOJQJaJmH sH 'h_VhmH6CJOJQJaJmH sH 'h_Vh;6CJOJQJaJmH sH 'h_Vhs6CJOJQJaJmH sH 'h_VhoR6CJOJQJaJmH sH $h_VhCJOJQJaJmH sH $h_Vh;CJOJQJaJmH sH $h_VhsCJOJQJaJmH sH $h_VhD&CJOJQJaJmH sH ku&56VkԾԨԒ||||||||ffP*h_Vhl56CJOJQJaJmH sH *h_VhyDW56CJOJQJaJmH sH *h_Vh:56CJOJQJaJmH sH *h_Vh]"56CJOJQJaJmH sH *h_VhD&56CJOJQJaJmH sH *h_Vh{56CJOJQJaJmH sH *h_Vh7s56CJOJQJaJmH sH *h_VhsǴǡ{h{U{B$h_VhCJOJQJaJmH sH $h_VhMCJOJQJaJmH sH $h_VhCJOJQJaJmH sH $h_VhXCJOJQJaJmH sH $h_Vh_&CJOJQJaJmH sH $h_VhXCJOJQJaJmH sH $h_VhVECJOJQJaJmH sH $h_VhCJOJQJaJmH sH $h_VhOCJOJQJaJmH sH $h_Vh1CJOJQJaJmH sH R$ & FV^`Va$gd3$ & F^a$gd3$Vd^`Va$gd3Vd^`Vgd3$d^a$gdx`< $da$gdx`< $da$gdKu >Xd ǴxdxPxPxP=$h_Vh3CJOJQJaJmH sH 'h_Vh 4H5CJOJQJaJmH sH 'h_Vh>5CJOJQJaJmH sH 'h_Vh35CJOJQJaJmH sH 'h_Vh>5CJOJQJaJmH sH 'h_Vh35CJOJQJaJmH sH $h_VhCJOJQJaJmH sH $h_Vh>CJOJQJaJmH sH $h_VhCJOJQJaJmH sH $h_Vhx`<CJOJQJaJmH sH  JXZ NRڲwcPP@h_Vh 4H5OJQJmH sH $h_Vh%gCJOJQJaJmH sH 'h_Vh{$l6CJOJQJaJmH sH $h_Vh{$lCJOJQJaJmH sH 'h_Vh%g5CJOJQJaJmH sH 'h_Vh35CJOJQJaJmH sH 'h_Vh 4H5CJOJQJaJmH sH 'h_Vh36CJOJQJaJmH sH $h_Vh3CJOJQJaJmH sH $h_Vh 4HCJOJQJaJmH sH ?@Pdefjlmn)JОvvvg\gH'h_Vh36CJOJQJaJmH sH h_Vh!\mH sH jh_Vh!\UmH sH 'h_Vh 4H5CJOJQJaJmH sH 'h_Vh35CJOJQJaJmH sH $h_Vh3CJOJQJaJmH sH h_Vh%gOJQJmH sH h_Vh36OJQJmH sH h_Vh3OJQJmH sH h_Vh 4H5OJQJmH sH h_Vh35OJQJmH sH R@piz{|$Vd^`Va$gd3$ & FVd^`Va$gd3$Vd^`Va$gd3$ & FVd^`Va$gd3m$$ & FVd^`Va$gd3JKLMpwz{|ðnnXI>I*'h_Vh3CJOJQJ\aJmH sH h_Vh!\mH sH jh_Vh!\UmH sH *h_Vh36CJOJQJ]aJmH sH *h_Vh35CJOJQJ]aJmH sH *h_Vh 4H5CJOJQJ]aJmH sH *h_VhZs5CJOJQJ]aJmH sH $h_Vh3CJOJQJaJmH sH $h_Vh%gCJOJQJaJmH sH -jh_Vh!\CJOJQJUaJmH sH $h_Vh 4HCJOJQJaJmH sH >?ST`dhiwxyԿiT@,@'h_Vh35CJOJQJaJmH sH 'h_Vh 4H5CJOJQJaJmH sH (h_Vh{$lCJOJPJQJaJmH sH 4jh_Vh!\6CJOJPJQJUaJmH sH +h_Vh36CJOJPJQJaJmH sH h_Vh!\mH sH jh_Vh!\UmH sH h_Vh3mH sH (h_Vh3CJOJPJQJaJmH sH $h_Vh3CJOJQJaJmH sH 0jh_Vh!\CJOJQJU\aJmH sH y}*+hijĵ}jĵSj-jh_Vh!\CJOJQJUaJmH sH $h_Vh%gCJOJQJaJmH sH 0jh_Vh!\6CJOJQJUaJmH sH 'h_Vh36CJOJQJaJmH sH h_Vh!\mH sH jh_Vh!\UmH sH $h_Vh3CJOJQJaJmH sH 'h_Vh 4H5CJOJQJaJmH sH 'h_Vh35CJOJQJaJmH sH FG9:ܻo[B0h_Vh3CJOJPJQJaJmH nHsH tH'h_Vh35CJOJQJaJmH sH 'h_Vh>5CJOJQJaJmH sH $h_Vh3CJOJQJaJmH sH h_Vh%gmH sH 3jh_Vh!\6CJOJQJU\aJmH sH *h_Vh36CJOJQJ\aJmH sH h_Vh!\mH sH jh_Vh!\UmH sH 'h_Vh3CJOJQJ]aJmH sH <U|εΡΈΈubuN:'h_Vh35CJOJQJaJmH sH 'h_Vh>5CJOJQJaJmH sH $h_Vh%gCJOJQJaJmH sH $h_Vh3CJOJQJaJmH sH 0h_Vh3CJOJPJQJaJmH nHsH tH'h_VhTBCJOJQJ\aJmH sH 0h_Vh%gCJOJPJQJaJmH nHsH tH'h_Vh3CJOJQJ\aJmH sH 9jh_Vh!\CJOJPJQJUaJmH nHsH tH$%.:UVRSTdkQ>$h_Vh%gCJOJQJaJmH sH 3h_Vh3CJOJPJQJ\aJmH nHsH tH3h_Vhb"CJOJPJQJ\aJmH nHsH tH(h_Vhb"0J6CJOJQJaJmH sH $h_Vhb"0J6OJQJ^JmH sH $h_Vhb"CJOJQJaJmH sH $h_Vh3CJOJQJaJmH sH +h_Vh{$lCJOJPJQJ\aJmH sH +h_Vh3CJOJPJQJ\aJmH sH %T6@R{{{$ & FVd7$8$H$^`Va$gd3 & F d7$8$H$^`gdb"$ & F d^`a$gdb"$ & FVd^`Va$gd3$ & FV^`Va$gd3r&4:>12ǴڴڡڡڴڎzjڴWHjh_VhMd.UmH sH $h_VhTBCJOJQJaJmH sH h_VCJOJQJaJmH sH 'h_Vh_V6CJOJQJaJmH sH $h_Vh_VCJOJQJaJmH sH $h_Vh~=CJOJQJaJmH sH $h_Vh{$lCJOJQJaJmH sH $h_Vhb"CJOJQJaJmH sH $h_Vh3CJOJQJaJmH sH $h_Vh 4HCJOJQJaJmH sH 2QRYZ\]<>LNPRѸrrrr_$h_Vh{$lCJOJQJaJmH sH 1jh_Vh!\0J'CJOJQJUaJmH sH h_Vh!\mH sH jh_Vh!\UmH sH $h_Vh3CJOJQJaJmH sH 1jh_VhMd.0J'CJOJQJUaJmH sH (h_Vh30J'CJOJQJaJmH sH jh_VhMd.UmH sH h_VhMd.mH sH R.rx|bhVX`bfhڴڟwddQQQ$h_Vhs^CJOJQJaJmH sH $h_Vh,bCJOJQJaJmH sH 'h_Vh35CJOJQJaJmH sH 'h_Vh>5CJOJQJaJmH sH (h_Vh3CJOJQJ^JaJmH sH $h_Vh~=CJOJQJaJmH sH $h_Vh{$lCJOJQJaJmH sH $h_Vh3CJOJQJaJmH sH $h_Vhb"CJOJQJaJmH sH H^twl` $^a$gd3 $ & Fa$gd3 $da$gd3$ & Fda$gd3$Vd^`Va$gd3$Vd^`Va$gd3 $^a$gd3$ & FVd7$8$H$^`Va$gd3$ & FVd^`Va$gd3 \]rst+ , -   ĮĆĮvĮĮc$h_Vh 4HCJOJQJaJmH sH h_Vh3OJQJ\mH sH #h_Vh30J)5OJQJmH sH +h_Vh,b0J)5CJOJQJaJmH sH +h_Vhs^0J)5CJOJQJaJmH sH +h_Vh30J)5CJOJQJaJmH sH $h_Vh3CJOJQJaJmH sH $h_Vhs^CJOJQJaJmH sH . *    *,T$ & FVd^`Va$gd3$Vd^`Va$gd3$d^a$gd3$ & Fd^a$gd3 $da$gd3$ & Fda$gd3  & Fdgds^    $ & ( `           2 4 6 8     j¯گگڠtگt\I$h_VhTBCJOJQJaJmH sH .h_Vh30J)5CJOJQJ\aJmH sH +h_Vh 4H0J)5CJOJQJaJmH sH +h_Vh30J)5CJOJQJaJmH sH h_Vh3OJQJmH sH $h_Vh3CJOJQJaJmH sH /h_Vh3CJOJQJ\aJmH nHsH tH$h_Vh 4HCJOJQJaJmH sH $h_VhZsCJOJQJaJmH sH (,TV'(PQk֬։~mX։~C(h_Vh30J'CJOJQJaJmH sH )jh_Vh!\0J'OJQJUmH sH  h_Vh30J'OJQJmH sH h_Vh!\mH sH jh_Vh!\UmH sH 'h_Vh35CJOJQJaJmH sH 'h_Vht5CJOJQJaJmH sH +h_Vh 4H0J)5CJOJQJaJmH sH $h_Vh3CJOJQJaJmH sH +h_Vh30J)5CJOJQJaJmH sH 'm89:nG$ >da$gdBS $da$gdBS$a$gdBS $da$gdb;$d^a$gd3$ & FVd^`Va$gd3klmn 67:;ĹĤĹĤĹĤppapapQphBSh#{>*OJQJmH sH hBSh_VOJQJmH sH hBSh#{OJQJmH sH  hBSh#{0JOJQJmH sH 'h_Vh3CJOJQJ\aJmH sH (h_Vh30J'CJOJQJaJmH sH h_Vh!\mH sH jh_Vh!\UmH sH $h_Vh3CJOJQJaJmH sH 1jh_Vh!\0J'CJOJQJUaJmH sH lrFGHIسydQ81jhBSh#{0JCJOJQJUaJmH sH $hBSh#{CJOJQJaJmHsH)jhBSh#{0JCJOJQJUaJhBSh#{OJQJmHsHhBSh#{OJQJ!jhBSh#{0JOJQJUhBSh#{OJQJmH sH )jhBSh#{0JOJQJUmH sH hCJOJQJaJmH sH $hBSh#{CJOJQJaJmH sH 'hBSh#{CJOJQJ\aJmH sH !"}~!/0^n|}~CD/0dvƱݜ}}la}Nla%hBSh#{B*OJQJmH phsH hBSh#{OJQJ!jhBSh#{0JOJQJUhBSh#{6OJQJmH sH hBSh#{OJQJmH sH )jhBSh#{0JOJQJUmH sH (hBSh#{0J'CJOJQJaJmH sH -jhBSh#{CJOJQJUaJmH sH $hBSh#{CJOJQJaJmH sH hTlCJOJQJaJmH sH /|C/,V $!#$ &h'''@(($ hd^a$gdBS $a$gdBS$a$gdBS $  a$gdBS $da$gdBS,-V W $!%!##$$%% & & &Y'taN$hBSh#{CJOJQJaJmH sH $hBSh#{CJOJQJaJmHsH1jhBSh#{0JCJOJQJUaJmHsHhBShY'OJQJmH sH hh#{OJQJmH sH )jhh#{0JOJQJUmH sH hBSh#{OJQJ!jhBSh#{0JOJQJU)jhBSh#{0JOJQJUmH sH hBSh#{OJQJmH sH Y'g'h'i''''@(A(((|)})))++<,>,,,--ؿتuuZ;=jhBSh#{0J'>*B*CJOJQJUaJmH phsH 4hBSh#{0J'>*B*CJOJQJaJmH phsH -jhBSh#{CJOJQJUaJmH sH hBSh#{OJQJmH sH hBSh;"OJQJmH sH )jhBSh#{0JOJQJUmH sH 1jhBSh#{0JCJOJQJUaJmH sH $hBSh#{CJOJQJaJmH sH 'hBSh#{CJOJQJ]aJmH sH (|))+-Tcehiijllll8op(r t"t&t(t,t dgd4=P$d7$8$H$a$gdBS($a$gdBS $da$gdBS$a$gdBS-----bbbPcTcVcXcbddddɺ}laL7L(jhBSh#{CJUaJ(hBSh SB*CJ\aJmH phsH (hBSh#{B*CJ\aJmH phsH hBSh#{CJaJ!jhBSh#{0JCJUaJhBSh#{OJQJmHsHhBSh#{OJQJhBSh#{OJQJmH$sH$#hBSh#{0J)5OJQJmH$sH$UhBSh#{OJQJmHsH!jhBSh#{0JOJQJU$hBSh#{CJOJQJaJmH$sH$$hBSh#{CJOJQJaJmH sH Poro ilo o delu Urada Republike Slovenije za prepre evanje pranja denarja za leto 2010; available at: [http://www.uppd.gov.si/si/delovna_podrocja/podatki_o_delu_urada/].  Main elements related to National Office for Prevention and Control of Money Laundering s activity, performed within the year 2010, Synthesis of the activity report; available at: [ HYPERLINK "http://www.onpcsb.ro./" http://www.onpcsb.ro./ pdf/NOPCML%20Report%202010.pdf].  Law of Ukraine on Prevention and Counteraction to Legalization (Laundering) of the Proceeds from Crime or Terrorist Financing as of 18.05.2010, No 2258 (entered into force on August 21, 2010); available at: [http://www.coe.int/t/dghl/monitoring/moneyval/Evaluations/progress%20reports/MONEYVAL(2010)1_ProgRep_UKR_en.pdf].  Annual report by the Money Laundering Reporting Office Switzerland (MROS): a publication of the Federal Office of Police, Bern; available at: [http://www.fedpol.admin.ch/content/fedpol/en/home/dokumentation/ berichte/geldwaescherei.html].  Articles 305 and 260 of the Federal Act onCombating Money Laundering in the Financial Sector.  Taken from the "Traitement du renseignement et action contre les circuits financiers clandestins (TRACFIN), Rapport d`activit 2010, Montreuil-sous-Bois cedex, France"; available at: [  HYPERLINK "http://www.tracfin.bercy.gouv.fr/" http://www.tracfin.bercy.gouv.fr/ pdf/rap2010_ang.pdf].  For more information, see: Federal Criminal Police Office, FIU Germany Annual Report 2010; available at: [http://www.bka.de/nn_195184/EN/Publications/AnnualReportsAndSituationAssessments/FinancialIntelligenceUnitFiuGermany/financialIntelligenceUnitFiuGermany__node.html?__nnn=true].  Act on the Detection of Proceeds from Serious Crimes (August 2008); available at: [http://www.bka.de/nn_194638/SharedDocs/Downloads/EN/Subjects__A__Z/FIU/moneyLaunderingAct2008.html?__nnn=true].  Izvjeataj o radu Uprave za spre avanje pranja novca za 2010; available at: [http://www.apml.org.rs/REPOSITORY/86_izvestaj-o-radu-uprave-za-sprecavanje-pranja-novca-za-2010.pdf]  For more information, see MONEYVAL Report for Liechtenstein; available at: [ HYPERLINK "http://www.coe.int/t/dghl/monitoring/" http://www.coe.int/t/dghl/monitoring/moneyval/Evaluations/Progress%20reports%202y/MONEYVAL(2010)30-ProgRep2LIE_en.pdf].      PAGE \* MERGEFORMAT 1 d ee:e*B*CJU\aJmH phsH /hBSh#{0J'>*B*CJ\aJmH phsH jhBSh#{CJUaJhBSh#{CJaJi$jjjjjj"l$llllllllӾ~ggL-~=jhBSh#{0J'>*B*CJOJQJUaJmH phsH 4hBSh#{0J'>*B*CJOJQJaJmH phsH -jhBSh#{CJOJQJUaJmH sH 3hBSh#{CJOJPJQJ\aJmH nHsH tH$hBSh#{CJOJQJaJmH sH $hBSh#{CJOJQJaJmH sH )jhBSh#{0JCJOJQJUaJhBSh#{OJQJmH sH %hBSh#{B*OJQJmH phsH hBSh#{OJQJll4mtm6o8o:o*B*OJQJmH phsH %jhBSh#{OJQJUmH sH hBShR@VOJQJmH sH hBSh#{OJQJ!jhBSh#{0JOJQJU#hBSh#{OJPJQJ\mH sH ,hBSh#{0J)5B*OJQJmH phsH (hBSh#{B*OJQJ]mH phsH hBSh#{OJQJmH sH )jhBSh#{0JOJQJUmH sH xszs t"t$t(t*t.t0t4t6t:t@tBtptrtttvt|t~ttŽŽѓ$h_Vh3CJOJQJaJmH sH jh#{UmHnHuhz;mHnHujh#{Uh#{jhZybUhZybhBSh#{OJQJmH sH 5jhBSh#{0J'>*B*OJQJUmH phsH ,t.t2t4t8t:tt@txtzt|t~tt $da$gdb;""$a$  $a$ dgd4=P 6&P 1h:p2. A!"#$% $$Ifl!vh555#v#v5:V l" t0N6,55alp'$$Ifl!vh55"55555C#v#v"#v#vC:V l t0N6,5555alpFkd$$Ifl֞ {/# t0N644 lalpF#$$Ifl!vh55"55555C#v#v"#v#vC:V l t0N6,5555alpFkd$$Ifl֞ {/# t0N644 lalpF$$Ifl!vh55"55555C#v#v"#v#vC:V l t0N65555alpFkd$$Ifl֞ {/# t0N644 lalpF$$Ifl!vh55"55555C#v#v"#v#vC:V l t0N65555alpFkd $$Ifl֞ {/# t0N644 lalpF$$Ifl!vh55"55555C#v#v"#v#vC:V l t0N65555alpFkd $$Ifl֞ {/# t0N644 lalpF$$Ifl!vh55"55555C#v#v"#v#vC:V l t0N65555alpFkd0$$Ifl֞ {/# t0N644 lalpF$$Ifl!vh55"55555C#v#v"#v#vC:V l t0N65555alpFkdE$$Ifl֞ {/# t0N644 lalpF$$Ifl!vh55"55555C#v#v"#v#vC:V l t0N65555alpFkdZ$$Ifl֞ {/# t0N644 lalpF$$Ifl!vh55"55555C#v#v"#v#vC:V l t0N65555alpFkdo$$Ifl֞ {/# t0N644 lalpF$$Ifl!vh55"55555C#v#v"#v#vC:V l t0N65555alpFkd$$Ifl֞ {/# t0N644 lalpF!$$Ifl!vh55"55555C#v#v"#v#vC:V l  t0N65555alpFkd$$Ifl ֞ {/# t0N644 lalpFj< 666666666vvvvvvvvv666666>6666666666666666666666666666666666666666666666666hH6666666666666666666666666666666666666666666666666666666666666666662 0@P`p2( 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p8XVx OJPJQJ_HmHnHsHtHJ`J 4=PNormal dCJ_HaJmH sH tH p`p 4=P Heading 1$ Fd<@&*5CJ KH OJPJQJ\aJmHsHtHt`t 4=P Heading 2$ & Fd<@&)56CJOJPJQJ\aJmHsHtHp`p 4=P Heading 3$ & Fd<@&&5CJOJPJQJ\aJmHsHtHp`p 4=P Heading 4$ & Fd<@&&5CJOJPJQJ\aJmHsHtHp p 4=P Heading 5 & Fd<@&)56CJOJPJQJ\aJmHsHtHl l 4=P Heading 6 & Fd<@&&5CJOJPJQJ\aJmHsHtHj j 4=P Heading 7 & Fd<@&#CJOJPJQJ\aJmHsHtHl l 4=P Heading 8 & Fd<@&&6CJOJPJQJ\aJmHsHtHj j 4=P Heading 9 & Fd<@&#CJOJPJQJ\aJmHsHtHDA D Default Paragraph FontRi@R 0 Table Normal4 l4a (k ( 0No List Z/Z 4=PHeading 1 Char&5CJ KH OJPJQJ\^JaJtHZ/Z 4=PHeading 2 Char%56CJOJPJQJ\^JaJtHV/V 4=PHeading 3 Char"5CJOJPJQJ\^JaJtHV/!V 4=PHeading 4 Char"5CJOJPJQJ\^JaJtHZ/1Z 4=PHeading 5 Char%56CJOJPJQJ\^JaJtHR/AR 4=PHeading 6 Char5OJPJQJ\^JaJtHT/QT 4=PHeading 7 CharCJOJPJQJ\^JaJtHV/aV 4=PHeading 8 Char"6CJOJPJQJ\^JaJtHP/qP 4=PHeading 9 CharOJPJQJ\^JaJtH&` 4=P4Footnote Reference,Footnote symbol,Footnote,FussnotaH*` 4=PFootnote Text,fussnote,single space,FOOTNOTES,fn,Char Char,Footnotes,Footnotes Char,Footnote Text Char Char,Footnotes Char Char,Tekst fusnote Char,Footnotes Char2,Footnotes Char Char2,Footnote Text Char Char Char1 d#CJOJPJQJ\aJmHsHtH,/, 4=PFootnote Text Char,fussnote Char,single space Char,FOOTNOTES Char,fn Char,Char Char Char,Footnotes Char1,Footnotes Char Char1,Footnote Text Char Char Char,Footnotes Char Char Char,Tekst fusnote Char Char,Footnotes Char2 Char,Footnotes Char Char2 CharCJOJPJQJ\^JaJtH@@@ 4=P0List Paragraph ^m$BQ B 4=P Body Text 3x CJaJtHX/X 4=PBody Text 3 Char CJOJPJQJ^JaJmH sH f^@f 4=P Normal (Web)ddd#CJOJPJQJ\aJmHsHtHtt 4=P Table Grid7:V0 dJ`J !4=P0Header dp# CJaJtHF/F 4=P0 Header CharOJPJQJ^JmH sH J `"J #4=P0Footer"dp# CJaJtHF/1F "4=P0 Footer CharOJPJQJ^JmH sH 2/A2 %, postbody1CJaJtRt ._ t-12-9-fett-s%ddd[$\$a$&5CJOJPJQJ\aJmHsHtHhObh ._tb-na16&ddd[$\$a$&5CJ$OJPJQJ\aJ$mHsHtH6U`q6 0 Hyperlink >*B*ph^o^ jDefault (7$8$H$)B*CJOJQJ_HaJmHphsHtH *W`* j`Strong5\t t  p(p TOC Heading*$ Fd@& )B*CJKHOJPJQJ^JaJph6_tH R R , p(0 Balloon Text +dCJOJQJaJtHZ/Z + p(0Balloon Text Char CJOJPJQJ^JaJmH sH ** 9pTOC 1-d.. 9pTOC 2 .d^.. 9pTOC 3 /d^H H 0 No Spacing0CJ_HaJmHsHtH <+< 2d0 Endnote Text1CJaJ:!: 1d0Endnote Text Char>* 1> d0Endnote ReferenceH*2B@B2 3a Body Text4xFV QF tFollowedHyperlink >*B* ph2oa2 b"st15CJ\aJph"""B' qB g 0Comment ReferenceCJaJ< < 9 g 0 Comment Text8CJaJF/F 8 g 0Comment Text Char mH sH tH @j @ ; g 0Comment Subject:5\R/R : g 0Comment Subject Char5\mH sH tH PK![Content_Types].xmlj0Eжr(΢Iw},-j4 wP-t#bΙ{UTU^hd}㨫)*1P' ^W0)T9<l#$yi};~@(Hu* Dנz/0ǰ $ X3aZ,D0j~3߶b~i>3\`?/[G\!-Rk.sԻ..a濭?PK!֧6 _rels/.relsj0 }Q%v/C/}(h"O = C?hv=Ʌ%[xp{۵_Pѣ<1H0ORBdJE4b$q_6LR7`0̞O,En7Lib/SeеPK!kytheme/theme/themeManager.xml M @}w7c(EbˮCAǠҟ7՛K Y, e.|,H,lxɴIsQ}#Ր ֵ+!,^$j=GW)E+& 8PK!Ptheme/theme/theme1.xmlYOo6w toc'vuر-MniP@I}úama[إ4:lЯGRX^6؊>$ !)O^rC$y@/yH*񄴽)޵߻UDb`}"qۋJחX^)I`nEp)liV[]1M<OP6r=zgbIguSebORD۫qu gZo~ٺlAplxpT0+[}`jzAV2Fi@qv֬5\|ʜ̭NleXdsjcs7f W+Ն7`g ȘJj|h(KD- dXiJ؇(x$( :;˹! I_TS 1?E??ZBΪmU/?~xY'y5g&΋/ɋ>GMGeD3Vq%'#q$8K)fw9:ĵ x}rxwr:\TZaG*y8IjbRc|XŻǿI u3KGnD1NIBs RuK>V.EL+M2#'fi ~V vl{u8zH *:(W☕ ~JTe\O*tHGHY}KNP*ݾ˦TѼ9/#A7qZ$*c?qUnwN%Oi4 =3ڗP 1Pm \\9Mؓ2aD];Yt\[x]}Wr|]g- eW )6-rCSj id DЇAΜIqbJ#x꺃 6k#ASh&ʌt(Q%p%m&]caSl=X\P1Mh9MVdDAaVB[݈fJíP|8 քAV^f Hn- "d>znNJ ة>b&2vKyϼD:,AGm\nziÙ.uχYC6OMf3or$5NHT[XF64T,ќM0E)`#5XY`פ;%1U٥m;R>QD DcpU'&LE/pm%]8firS4d 7y\`JnίI R3U~7+׸#m qBiDi*L69mY&iHE=(K&N!V.KeLDĕ{D vEꦚdeNƟe(MN9ߜR6&3(a/DUz<{ˊYȳV)9Z[4^n5!J?Q3eBoCM m<.vpIYfZY_p[=al-Y}Nc͙ŋ4vfavl'SA8|*u{-ߟ0%M07%<ҍPK! ѐ'theme/theme/_rels/themeManager.xml.relsM 0wooӺ&݈Э5 6?$Q ,.aic21h:qm@RN;d`o7gK(M&$R(.1r'JЊT8V"AȻHu}|$b{P8g/]QAsم(#L[PK-![Content_Types].xmlPK-!֧6 +_rels/.relsPK-!kytheme/theme/themeManager.xmlPK-!Ptheme/theme/theme1.xmlPK-! ѐ' theme/theme/_rels/themeManager.xml.relsPK] fyn- )-2`4l5T77}8x=IJLhR}UWXXZ[fn/v|}~D8D2|&%  !"#$%&b LB G} L~.BVl)H !!""&% ---0 pGIu"%(m+-02579`<g>x?5ACDoFI^LMOQyTVhZi]]`bcc f.hPkpmo[r.thuvNyA{5||}~~ɀ}+7'?P8ϖdiC5|rrkQ0H> Jy2R kY'-dilxst      !"$&')*+-.0;<=>Jn+6DO`r{?{{|}.LER(,tt#%(,/?mK>S*hF91QY\&'Pkm6&%XXTXTXXXXXXXXXXTXTXTXXT')0!}C@H 2I"B"h""XXXXXL# @0(  B S  ? _Toc314563591 _Toc314749833 _Toc314563593 _Toc314749835 _Toc221343060 _Toc224184280 _Toc314563595 _Toc314749837 _Toc314563596 _Toc314749838 _Toc314563597 _Toc314749839 _Toc314563598 _Toc314749840 _Toc221176755 _Toc221342949 _Toc224184169 OLE_LINK1 _Toc314563599 _Toc314749841 _Toc314563600 _Toc314749842 _Toc314563601 _Toc314749843 _Toc314563602 _Toc314749844 _Toc314749845 _Toc314563603 _Toc314749846 _Hlt35094688022F>F>4D4DOLOLUU[[[[[\[j[jfmfmvvffL""'% @(3(34D4D^D^DwLwLUU[[S\___jjmm-w-w$$'%|_ _ _ <_ |_  ?\ @ A܈ B C\ D E\ F G܊ H I\ J K܋ L M\ ((33!3A3A3M3<<}l}ll?s?ststssstt\t\ttttt?u?uuuuuvv$x$x0x9x9xFxFx[x[xԃԃރރ&&aaƎƎώώbb ^^ 55xx!!))66FFLLEE[[))&&LLkk""QQ,,'%      !"$#%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~((3(3(3I3T3T3<<lllGsGszszsssttctctttttEuEuuuuuvv,x7x7xAxAxMxMxbxbx܃܃ĄĄ..hh͎͎֎֎ii&& %%dd<<''11CCLLWWLLhh%%00,,PPrr&&$$YY55'%   !"$#%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~=*urn:schemas-microsoft-com:office:smarttags PlaceType=*urn:schemas-microsoft-com:office:smarttags PlaceName8*urn:schemas-microsoft-com:office:smarttagsCityB*urn:schemas-microsoft-com:office:smarttagscountry-region9*urn:schemas-microsoft-com:office:smarttagsplace8*urn:schemas-microsoft-com:office:smarttagsdate9*urn:schemas-microsoft-com:office:smarttagsState 8 1101997200820108DayMonthYear||:!J$$$$$$$%%%%!%$%'%BP)*ffrr nZfYdH]JL:mtF1{< F  + |,8; K!^!I##$$$$$$$$%%%$%'%3333333333333333333333333T||K+,g[q[hvovvvɃ˃N$.9:67QIC        "V$V\r} h@%> b!c!G#$$$$$$$$%%%$%'%Q||NNWWɃʃ$.:69==PP$$$$$$$$$%%%$%'%$|hI@}y0~ 5ðh,vtd|3D!8!^@>9?>Z 8p(99Lui:r &XoV}F<Ȯ;\IbHaXkQL pUT _aU(¼\4]qLl_ ]ax vg`n+81i#C; jcsBtNt|8C1uF%Hy|& q~aO^`.^`.^`.^`. ^`OJQJo( ^`OJQJo( ^`OJQJo( ^`OJQJo(hh^h`. hh^h`OJQJo( ^`OJQJo(^`OJQJ^Jo(o pp^p`OJQJo( @ @ ^@ `OJQJo(^`OJQJ^Jo(o ^`OJQJo( ^`OJQJo(^`OJQJ^Jo(o PP^P`OJQJo( ^`OJQJo(^`OJQJ^Jo(o pp^p`OJQJo( @ @ ^@ `OJQJo(^`OJQJ^Jo(o ^`OJQJo( ^`OJQJo(^`OJQJ^Jo(o PP^P`OJQJo(^`.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.^`o(.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.^`o(.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.hh^h`o()88^8`.L^`L.  ^ `.  ^ `.xLx^x`L.HH^H`.^`.L^`L.^`.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L. hh^h`OJQJo(88^8`OJQJ^Jo(o ^`OJQJo(   ^ `OJQJo(  ^ `OJQJ^Jo(o xx^x`OJQJo( HH^H`OJQJo(^`OJQJ^Jo(o ^`OJQJo(^`o(-^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.^`o()^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L. hh^h`OJQJo(88^8`OJQJ^Jo(o ^`OJQJo(   ^ `OJQJo(  ^ `OJQJ^Jo(o xx^x`OJQJo( HH^H`OJQJo(^`OJQJ^Jo(o ^`OJQJo(P^`P^`.0^`0..^`... ^` .... ^` ..... ^` ...... `^``....... 00^0`........^`o(.e^e`.5L^5`L. ^ `. ^ `.L^`L.u^u`.E^E`.L^`L.h^h`.8^8`.L^`L. ^ `. ^ `.xL^x`L.H^H`.^`.L^`L.^`.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L. hh^h`OJQJo(88^8`OJQJ^Jo(o ^`OJQJo(   ^ `OJQJo(  ^ `OJQJ^Jo(o xx^x`OJQJo( HH^H`OJQJo(^`OJQJ^Jo(o ^`OJQJo(^`.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.h^h`.8^8`.L^`L. ^ `. ^ `.xL^x`L.H^H`.^`.L^`L.h^h`.P^`P..^`...x^`x.... ^` .....  X^ `X ......  ^ `....... 8^`8........ `^``.........h^`OJQJo(hHP ^P `OJQJ^Jo(o  ^ `OJQJo( ^`OJQJo(^`OJQJ^Jo(o ^`OJQJo( `^``OJQJo(0^0`OJQJ^Jo(o ^`OJQJo(^`.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.^`.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.^`o()^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.^`)^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.h^h`.P^`P..^`...x^`x.... ^` .....  X^ `X ......  ^ `....... 8^`8........ `^``.........^`.^`^J.pL^p`L^J.@ ^@ `^J.^`^J.L^`L^J.^`^J.^`^J.PL^P`L^J.( q~pU>9?a8!^\4]l_:XkQ &pU ;\I%Hy|_aUZ C; juiV}F<(99C1urtNtpU` +81i vgcsapUnpU o~}|QPJQ($$                          l_        .nl_        :2         (@yQ8^H(@ ,yQl 13nhn#<MCN_du%'8@ff&:ZW5:P`2oGqv%f;ab  DI O 4s  # Y  V - '? g L GM \ <H5wv~1,6_Xhj|x` #+U-'Q!>=>)>>P>&w>f?!?"??3?8?>?H?Bn?{?8@G@jj@AAcArAB68BJiB lBCBCGsC=D$E%EF&F2FQFrG&GHGpG{GHmH 4H}CHI%>IJJJ#J7JaJ KDKlK{L:L9SLM;)N^SNO7O"P4=PQP@\P\P+Q&6QHQKQ_QRDRoRSuS S{/SwS8TT $U5UIVVgOg=PgVg-`gfgthDhiI1i;i^nij j;jd?jNNjYjk3k]Ck`k{$l8ls+-`<H$F~E7Uf[d_wVHrL8X_Xjo 6ND!;-Qkp NHXj-uAXw|0eW,0~Q[Fh:?TzM%nTdvKy ##\&#5TBTJdr$Yux- -<=)'f1V@=_KPEmZe.g!*M5{ HJ7s f zA\Duu W$18xfD3aoer{2 l ooy1/iIW DJN2MQuZ$/5DFS{%%9Vaz7/=DVEiJ `a iye"iosBwq:Ac/9WXc6i4y j56LV{g*>bjP|NUb;iZ|oouj<08*L+hV*b.2[ck.k z)Y R+aYZs  'j2J=K^SZTgJ"*KNNDkomNOt Y'-=FcEr ~\ saW 3xbp&q (Tb`5DM,(C[fwdxH&cD+-XY<z40QZ5(EAa`GOBSmCp}o(dM!Yq3:<~Pqy]ZFMI .7@Pdx~:%#a$m|p^%ga9-YTy CK >hr!3)FfR{)H[Es|4J 6%@B[sv"8Zd"#{l6:f|<~JUbd&u) AJ"O7\E1VIYKTlzl:<@~~X~~&%p@pp@pp@pp @p p p @pp(@p*p,pbUnknown G*Ax Times New Roman5Symbol3. *Cx Arial7.@ Calibri?= *Cx Courier New7@Cambria5. .[`)Tahoma;WingdingsA$BCambria Math"1 Z'Z'&+=!24a$ OQHX  $P4=P2!xx@PRANJE NOVCA: KORELACIJA PROCJENE RIZIKA I SUMNJIVIH TRANSAKCIJA Administrator Administrator$                           ! " # Oh+'0$ <H h t  DPRANJE NOVCA: KORELACIJA PROCJENE RIZIKA I SUMNJIVIH TRANSAKCIJAAdministratorNormalAdministrator3Microsoft Office Word@F#@b6 @ĕ @]3&՜.+,D՜.+, hp  cHewlett-Packard Company APRANJE NOVCA: KORELACIJA PROCJENE RIZIKA I SUMNJIVIH TRANSAKCIJABPRANJE NOVCA: KORELACIJA PROCJENE RIZIKA I SUMNJIVIH TRANSAKCIJA TitleNaslov 8@ _PID_HLINKSA&(0http://www.uppd.gov.si/ Q-"http://www.tracfin.bercy.gouv.fr/ M*http://www.onpcsb.ro/ (#'http://www.fedpol.admin.ch/ 6&$http://www.apml.org.rs/ \!Bhttp://www.uradni-list.si/1/objava.jsp?urlid=201177&stevilka=3273 Q Ahttp://www.uradni-list.si/1/objava.jsp?urlid=201019&stevilka=808 9g8http://www.uradni-list.si/1/objava.jsp?urlurid=20092424 U Bhttp://www.uradni-list.si/1/objava.jsp?urlid=200947&stevilka=2339 ] Bhttp://www.uradni-list.si/1/objava.jsp?urlid=200760&stevilka=3206 gt\http://ec.europa.eu/internal_market/company/docs/financial-crime/20110124_study_amld_en.pdf Qhttp://www.amazon.com/Responding-Money-Laundering-International-Perspectives/dp/9057021110/ref=sr_1_44/103-7926034-3998212?ie=UTF8&s=books&qid=1178700983&sr=8-44 uk http://www.amazon.com/Transnational-Criminal-Organizations-Cybercrime-Laundering/dp/0849328063/ref=pd_bbs_10/103-7926034-3998212?ie=UTF8&s=books&qid=1178700903&sr=8-10 db http://www.amazon.com/Money-Laundering-Counter-Measures-European-Union/dp/9041121315/ref=sr_1_15/103-7926034-3998212?ie=UTF8&s=books&qid=1178700903&sr=8-15 >http://knjiznica.pravo.hr/cgi-bin/unilib.cgi?form=D1930303812 >http://knjiznica.pravo.hr/cgi-bin/unilib.cgi?form=D1940225905 Ihttp://www.amazon.com/Money-Laundering-Butterworths-Compliance-Graham/dp/0406932484/ref=pd_bbs_11/103-7926034-3998212?ie=UTF8&s=books&qid=1178700903&sr=8-11  &http://www.coe.int/t/dghl/monitoring/ Q "http://www.tracfin.bercy.gouv.fr/ c)http://www.onpcsb.ro./ ] Bhttp://www.uradni-list.si/1/objava.jsp?urlid=200760&stevilka=3206 ,&Whttp://www.fatfgafi.org/media/fatf/documents/recommendations/pdfs/FATF Recommendations   !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@BCDEFGHIJKLMNOPQRTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~Root Entry F MJData A"1TableSOWordDocument8SummaryInformation(DocumentSummaryInformation8CompObjy  F'Microsoft Office Word 97-2003 Document MSWordDocWord.Document.89q