The Three Biggest Blind Spots in AML/CFT Audits (and How They Can Ruin Your Organisation)

Introduction: Why Your AML/CFT Audit May Fall Short 

The AML/CFT audit is complete. The report looks good. Compliance has finished its annual reviews, and collectively the conclusion is: we’re in control. 

And yet… several clients turn out to be part of a money laundering network worth hundreds of millions of euros. Your monitoring tool missed transactions that a competitor did flag. An employee has been approving PEP transactions for years without any enhanced due diligence measures in place. 

How is that possible? 

In practice, AML/CFT audits are frequently vulnerable to a number of fundamental blind spots: organizational culture, human behaviour under pressure, and the way data is used and interpreted. 

In this article we unpack: 

  • Blind spot 1 – Culture: Why a “compliance tick-box culture” masks real risk. 
  • Blind spot 2 – People: The psychology behind ignoring red flags. 
  • Blind spot 3 – Data: Why your monitoring tools miss more than they catch. 

 

Blind Spot 1: The “Compliance Tick-Box Culture” – Why Your Organization Thinks It’s Compliant When It Isn’t 

In many organizations, AML/CFT compliance has gradually shifted from a risk-driven discipline to an administrative process. What was once designed to make risks visible and manageable has in practice often been reduced to following steps and ticking checklists. Employees do what is asked of them but rarely pause to consider what it means — for risks, for the organization, or for overall effectiveness. The result? 

  • Reports full of confirmations that processes exist and have been implemented, but with little concrete evidence that they work. 
  • Audits that focus on the “easy” components (such as client onboarding and policy checks), while complex risks (such as transaction monitoring and culture) are ignored. 
  • A false sense of security: “We’re compliant because we follow the rules.” 

Real-world example:

In 2025, de Volksbank was fined €20 million by the DNB because their compliance system was not up to date and risks were not being effectively mitigated. The problem? The bank had processes in place, but they were never critically assessed for effectiveness. Employees followed the rules but didn’t understand why — and so they missed signals that pointed to potential money laundering.

 

Why is this a blind spot?

Culture determines the depth of compliance

In organizations where compliance is seen as an obligation, a minimal approach quickly takes hold: “do just enough to get through the check.” Employees follow processes but don’t feel responsible for the underlying goal. Identifying risks requires curiosity, ownership, and often courage. When those elements are absent, deviations go unnoticed — not because they don’t exist, but because no one is actively looking, raising concerns, or speaking up. 

No personal accountability

When compliance is positioned as a separate department, an implicit divide emerges: “they handle the rules, we handle the business.” In theory, everyone remains responsible, but in practice that accountability erodes. Risk management becomes something you can pass along rather than something that is an integral part of daily work. The result is that signals get lost between teams or simply aren’t acted on because no one truly feels ownership. 

Fear of conflict

Asking critical questions about clients, transactions, or internal processes requires space and psychological safety. In many organizations, employees feel that space is limited. Those who push back questions are sometimes seen as difficult, causing delays, or “not commercial enough.” In high-pressure environments with a strong focus on targets, this effect can be amplified. The rational choice then becomes to stay within the lines and avoid discussion — even when there is doubt. 

How to address this: 

✔ Make compliance everyone’s responsibility: Explain why rules exist and why they matter to the organization (e.g. “This prevents us from being used for money laundering”) and what each person’s role should be. In your next audit, examine the sense of accountability across different teams.

✔ Create a compliance KPI: Encourage employees to report red flags, even when it’s uncomfortable. Compliance training is essential to help them recognize those flags. As an auditor, it is also important to investigate how compliance is incentivized.

✔ Test the culture: Run anonymous employee surveys: Do employees feel comfortable voicing criticism? Do they feel safe reporting irregularities?

✔ Let senior management set the tone: If management ignores compliance, the rest will too. As an auditor, be willing to address the impact of management’s tone. 

 

Blind Spot 2: Human Behavior – The Psychology Behind Ignoring Red Flags

We are not rational — including in compliance. Even if systems and processes are perfect, people make mistakes. And those mistakes are often caused by psychological pitfalls: 

 

Psychological Bias

How It Works

Example

Confirmation bias We seek information that confirms our existing beliefs. An auditor sees that a client looks fine “on paper” and ignores signals that suggest otherwise.
Overconfidence bias We overestimate our own ability to recognise risks. “We know our clients, so we know which transactions are safe.”
Groupthink Group pressure suppresses dissenting opinions. A team ignores a red flag because “everyone agrees there’s no risk here.”
Alert fatigue Too many false alarms lead to all signals being ignored. Employees automatically click “safe” because 99% of alerts turn out to be nothing.
Authority bias We blindly trust authority figures (e.g. senior management).  An employee doubts a transaction but does nothing because the manager says: “This is fine.” 

This vulnerability — these biases — doesn’t reside in systems or procedures, but in human behavior. And that is precisely what makes it so persistent. 

People are not machines

Even the most experienced auditors and compliance officers are constantly making judgements based on incomplete information. Unconscious assumptions and cognitive biases play a larger role than is often acknowledged — think of confirmation bias, but also “normalization of deviance” (deviations that occur often enough start to feel normal). In an audit context, this means signals that don’t immediately fit the expected pattern are more likely to be filtered out or rationalized away. 

Culture amplifies biases

This natural tendency is reinforced by the environment in which people work. Culture — the first blind spot — is a key factor here. In organizations where mistakes are primarily seen as something to be punished, hesitancy sets in. Employees become more cautious about asking critical questions or escalating uncertain cases. Not because they don’t see the risks, but because the personal or organizational cost of “being difficult” feels higher than the potential benefit. The result is that risks may be noticed but not always voiced. 

Pressure to deliver results

On top of this, incentives within organizations are not always aligned with risk management. When speed, commercial targets, or customer satisfaction carry more weight in assessments and rewards, tension arises. Employees who are evaluated throughput times or volumes will — consciously or unconsciously — tend to be less rigorous in their assessments. Not necessarily out of bad intent, but because the system nudges them in that direction. A compliance KPI could help to rebalance this. 

Together, these factors create an environment where risks don’t necessarily disappear but do become less visible. And that makes this one of the most insidious blind spots: everyone is doing their job, and yet a structural underestimation of what is really happening emerges. 

 

How to address this: 

✔ Train on behavior, not just rules: Teach employees to think critically and challenge assumptions. When auditing, review training materials with this theme in mind.

✔ Use red teaming: Have a team deliberately try to circumvent your systems. What works? Where do they hit obstacles? As an auditor, explore how an organization can guard against biases.

✔ Reward reporting mistakes: Build a culture where reporting errors is rewarded, not punished. Always worth probing this in interviews and walkthroughs.

✔ Automate where possible: Replace human judgement with objective criteria where feasible (e.g. “If a transaction has characteristics X, Y, and Z, always escalate”).

✔ Measure the quality of decisions: Analyze retrospectively how often human assessments were wrong and learn from them. 

 

Question for you:

What psychological pitfalls do you recognize in your own team? And how do you ensure that employees feel comfortable expressing their doubts?

 

Blind Spot 3: Data – Why Your Monitoring Tools Miss More Than They Find

Organizations rely on sophisticated monitoring tools to detect suspicious transactions. But what if those tools are not calibrated to the actual risks of your organization? Or if the data fed into the system is incomplete, outdated, or even misinterpreted? 

Real-world examples:

  • Bunq (Dutch neobank) was fined €2.6 million by the DNB in 2025 because their AML controls repeatedly fell short. One of the problems: monitoring tools missed patterns that were suspicious because they had not been calibrated to the specific risks of a fintech.
  • De Volksbank was unable to properly monitor customer activity between 2020 and 2023 because their systems did not keep pace with new money laundering methods (for example, structuring via small amounts).

On paper, data-driven monitoring appears to be one of the strongest lines of defense in AML/CFT. In practice, this is precisely where a fundamental vulnerability lies — not because there is too little data, but because the way we use that data has limitations that are often underestimated. 

 

False Negatives

A first problem lies in what is not seen: so-called false negatives. Monitoring tools are by definition based on models, scenarios, and historical patterns. They recognize what has previously been identified as a risk. But money laundering and fraud evolve constantly. New methods often fall outside existing parameters and therefore remain invisible. The system generates no alert, even though something is genuinely happening. And because “no alert” is often interpreted as “no risk,” a dangerous form of false assurance emerges. 

False Positives

On the other side is the opposite problem: false positives. Many systems generate large volumes of alerts, a considerable portion of which ultimately prove irrelevant. This creates an operational reality where employees must assess enormous volumes daily. Inevitably, alert fatigue sets in. Signals that were initially investigated carefully are increasingly dismissed as “probably nothing again.” Not out of negligence, but out of efficiency. The risk is clear: the one genuine signal can get lost in the noise. 

Data Silos

On top of this, data rarely forms a coherent whole. In many organizations, information is spread across different systems: client data in one platform, transaction data in another, risk assessments somewhere else. These silos make it difficult to connect the dots. A transaction may appear harmless on its own, as may a client profile. But in combination — across time and systems — a pattern may well become visible. If those puzzle pieces never come together, the bigger picture remains hidden. 

 

How to address this: 

✔ Validate your data: Ensure your monitoring tools detect the risks that are relevant to your organization. Test regularly with realistic scenarios. In an audit, dig deeper into how the rules (and their associated scenarios) were developed.

✔ Combine humans and machines: AI and data analysis are powerful, but human judgement is needed to add context (e.g. “This director is a PEP, but their assets are unrelated to the client organization”).

✔ Monitor effectiveness: Measure how many real risks your tool identifies and how many it misses. As an auditor, examine the monitoring tool’s statistics.

✔ Integrate data: Ensure that client data, transaction data, and risk data are connected, so that patterns can surface. Include data types in your audit scope.

 

Conclusion: From Blind Spots to Clear Vision

The three blind spots — culture, human behavior, and data — do not exist in isolation. They reinforce each other. An organization with a tick-box culture will be less critical about the effectiveness of its monitoring. People under pressure or driven by speed will be quicker to trust systems without questioning them. And systems that don’t work effectively but are still used in turn to feed the conviction that “everything is under control.” This creates a closed loop of false assurance. 

The uncomfortable reality is that many audits do not break this dynamic. They confirm that processes exist, that controls have been performed, and that reporting is accurate. But they rarely ask the sharp question: Does this system actually work when it really matters? 

An effective AML/CFT audit therefore looks not only at what has been set up, but above all at how it functions in practice — under pressure, when in doubt, and at the moments when it counts. That demands something different from auditors: 

  • Not just testing, but asking deeper questions 
  • Not just checking, but understanding 
  • Not just reporting, but also confronting 

Because ultimately the difference does not lie in even better policies or even more data. It lies in the willingness to see what you’d rather not see. The question, therefore, is not whether your organization has blind spots. 

 The question is: do you dare to truly make them visible? 

If you ignore these blind spots, you remain reactive rather than proactive. Your organization is not badly protected — but it is vulnerable in places where you least expect it. The 20% that truly makes an impact understands that a good AML/CFT audit is not about ticking regulatory boxes, but about exposing vulnerabilities before they can be exploited. 

 

Invitation to Consult

If this article has raised questions or prompted topics you would like to discuss further — or if you have a specific case, you would like to explore — we welcome you to reach out for an informal introductory conversation. Our contact details can be found on our website. 

 

Next Article

In the next article, we examine an uncomfortable truth: Internal Audit versus Business. Why audit teams are so often seen as a brake on progress — and how to change that. 

 

Get in touch

Dennis van der Meer | +31618948848 | dennis.van.der.meer@compliancechamps.com

Boy Custers | +31649935735 | boy.custers@compliancechamps.com

Pump.fun and the normalisation of Market Manipulation

Introduction

Platforms such as Pump.fun are attracting growing attention from regulators and politicians. They are often presented as a new danger in crypto. In reality, they mainly expose a much older problem: an online culture where speculation, hype, and influence increasingly blur the line between investing and manipulation. 

I saw that culture from the inside. I joined Telegram groups to find coins early, because that seemed to be where the real money was made. Returns of 20x or even 200x felt possible if you entered early enough. Groups reinforced this constantly through screenshots of huge gains and the suggestion that the next opportunity was always close. 

That created a permanent sense of urgency. Not participating did not feel cautious. It felt like missing out. 

How the System Works 

Inside these groups, pump and dump schemes were often organised in a simple pattern: a public group generated excitement, while a smaller inner circle got access to the coin first. By the time the larger group started buying, early participants were already preparing to sell. 

What stood out most was how normal this seemed. Many knew some people had an advantage, but few questioned it. It was simply accepted as part of the system. 

Over time, it stopped feeling like investing and started feeling like a game: fast, addictive, and constant. Gains and losses happened so quickly that the money barely felt real. When you win, your expectations rise. When you lose, you compare yourself not to where you started, but to your highest point. That creates the urge to win it back. 

That is where rational decision making begins to disappear. 

Why Pump.fun Matters

Pump.fun fits naturally into this environment. It did not invent pump and dump schemes, but it makes them easier, faster, and more visible. 

Creating a coin has become easy. They can be launched in minutes, traded instantly, tracked in real time, and promoted across social media. Speculation is no longer limited to niche communities. It has become part of the system itself. 

The consequences go beyond financial loss. Many users believe they are investing when they are actually entering a system designed to reward early insiders. This can lead to financial harm, addictive behaviour, unrealistic expectations about money, distrust in markets, and greater risks for younger users. 

Regulation and Solutions 

Regulators are responding. The Authority for the Financial Markets classifies pump and dump schemes as market abuse and states that such practices are prohibited under European rules.[1]

The Dutch government has also raised concerns about Pump.fun, particularly regarding young investors and the role of online influencers [2].

In the United Kingdom, the Financial Conduct Authority warned that Pump.fun is not authorised and that consumers should be cautious [3]. 

Simply banning or restricting a platform is rarely sufficient to address the underlying issue. When demand remains high, users often move elsewhere through private groups, new tools, or technical workarounds such as VPNs. Reports about Polymarket showed that some restricted users continued accessing the platform through VPNs, demonstrating how digital restrictions are often bypassed rather than respected [4]. 

Removing one platform does not remove the behaviour behind it. 

A more realistic response would combine enforcement, education, and prevention: detecting suspicious trading patterns, intervening faster, warning users inside apps, tightening influencer rules, and improving financial education for younger audiences. 

Conclusion 

The uncomfortable reality is that platforms like Pump.fun do more than enable speculation. They depend on it. As long as that remains profitable, they are unlikely to disappear. The real question is whether we are willing to accept a system in which speculation, hype, and unequal access are normalised, and in which the line between market participation and exploitation becomes increasingly difficult to see. 

 

Get in touch

Please reach out to us on: info@compliancechamps.com

Read more articles here.

 


[1] AFM. (n.d.). Pump and dump. Dutch Authority for the Financial Markets. 

[2] CoinDesk. (2024). Polymarket’s probe highlights challenges of blocking U.S. users and their VPNs. 

[3] FCA. (2024). Warning: Pump.fun. Financial Conduct Authority. 

[4] Rijksoverheid. (2025). Answers to parliamentary questions about Pump.fun. Dutch Government. 

Due Diligence and Reputation Research: Testing Integrity Before Saying ‘Yes’

In mergers, acquisitions, major client relationships, and investments—both domestic and international—the emphasis has traditionally been on financial and legal due diligence. Balance sheets are scrutinized, contracts are reviewed, and tax structures are analyzed. However, in practice, it often turns out that integrity issues, sanctions risks, and reputational damage, rather than numbers, are the true dealbreakers.

This article focuses on Integrity Due Diligence (IDD)—also known in international practice as Reputational Due Diligence. IDD does not replace legal, tax, or financial DD; rather, it serves as a complementary layer that answers a different question: “Do we actually want to be associated with this party?”

 

Why Financial and Legal DD Are Not Enough

Financial, tax, and legal DD are indispensable. They map out whether the figures are accurate, which contractual obligations exist, and which hard claims, securities, and tax risks are at play. Furthermore, regulators and legislators expect organizations to have their financial and legal houses in order.

At the same time, the bar is shifting. Sanctions regimes are becoming stricter, AML (Wwft/Wft) expectations are becoming more concrete, and media, NGOs, and regulators are looking more closely at ESG, human rights, and supply chain responsibility. Consequently, board members are increasingly told they “should have known” that a potential acquisition or key partner had integrity issues.

Additionally, reputational damage is difficult to repair. The traditional notion that legal, tax, and financial DD constitute “the” due diligence—and that integrity research is merely an optional add-on—no longer aligns with modern business realities.

The Blind Spot: In transactions, we often see a single total budget agreed upon for due diligence. This amount is usually consumed by standard components first. Anything outside of that is quickly dismissed as “nice-to-have” and is the first to be cut. This is precisely where blind spots are created.

 

The Foundation: Standard DD with IDD as a Complementary Layer

Modern due diligence has long evolved beyond the classic trio of financial, tax, and legal. While these remain the foundation—one cannot close a responsible deal without insight into figures and obligations—a whole generation of “supplementary” DD streams has emerged. Cyber and IT DD, technical DD, commercial and ESG DD, and sector-specific variants like environmental or regulatory DD are increasingly set up as separate workstreams.

In this article, we zoom in on Integrity Due Diligence (IDD). IDD is not a competing alternative to financial or legal DD, but a conscious broadening of scope. While traditional research focuses on the formal side of the enterprise, IDD looks at the behavior, integrity, and reputation of the organization and the people surrounding it.

This process combines:

  • Open Source Intelligence (OSINT): Registers, sanctions lists, court rulings, and regulatory sites.
  • Background Checks: Analyzing the track record of directors, UBOs (Ultimate Beneficial Owners), and key personnel.
  • Media Analysis: Reviewing NGO reports, social media, and international press.

The result is a cohesive picture that shows not only if the company is formally compliant, but whether you, as a buyer or investor, actually want to stand beside them.

 

Cross-Pollination Between Legal, Tax, Financial, and IDD

On paper, legal, tax, financial DD, and IDD complement each other perfectly. However, in practice, these streams often run too far apart, meaning important facts are not cross-referenced.

Consider an illustrative example: a standard question is whether directors or shareholders have ever been involved in a bankruptcy. In a legal Q&A, this question was answered in the negative. However, the IDD research—searching trade registers and media—revealed that one of the individuals had indeed been a director of a bankrupt company. This information was available in public sources. The discrepancy was only noticed by placing the legal Q&A answers alongside the OSINT findings from the IDD.

Similar cross-pollination is possible with financial and tax DD:

  • Public Annual Reports: Provide a high-level check on turnover, profit, and solvency to compare with data room figures.
  • Bankruptcy Reports & Litigation: Reveal past liabilities or seizures relevant to both legal and financial teams.
  • Tax Disputes & Fines: Visible in case law and news media, these can be reconciled with tax DD findings.

The goal is not to “replicate” a full financial DD using open sources, but to see if the internal image aligns with the public trail and identify where gaps or tensions exist. This requires a conscious “information bridge”: granting the IDD team access to relevant Q&A topics and systematically feeding IDD findings back to the legal, tax, and financial teams.

 

In-depth Anti-Corruption DD: Beyond the FCPA

For groups operating internationally with significant government contact or activities in high-risk countries, a generic IDD is sometimes insufficient. In these cases, it is supplemented by an explicit anti-corruption stream.

The FCPA (U.S. Foreign Corrupt Practices Act) is a well-known reference, but it is not the only one. The UK Bribery Act, France’s Sapin II law, and Brazil’s Clean Company Act all impose strict standards regarding bribery, anti-money laundering, and internal controls.

In practice, this translates into an in-depth DD track:

  1. Analyzing high-risk payments (gifts, hospitality, facilitation).
  1. Reviewing the role of agents and consultants.
  1. Evaluating approvals and monitoring in high-risk jurisdictions.

The aim is to assess whether the integrity and control levels align with the jurisdictions where the party is active and with the risk appetite of the buyer or financier.

 

The IDD Report as a “Living” Dossier

A high-quality IDD report has value throughout the entire lifecycle of a deal, not just at the moment of signing.

  • Phase 1: Supports the go/no-go decision.
  • Phase 2: Used for (re)financing with banks who conduct their own integrity checks.
  • Phase 3: Demonstrated to grant providers or funds to prove that integrity and sanctions risks have been carefully vetted.

Case Study: In a project involving a new data center, extensive screening was conducted on a party intended to be the center’s largest tenant. While the immediate goal was the client relationship, the investor looked further ahead: the real estate and client portfolio might be resold in the future. A robust IDD report serves as evidence for future buyers that risks were consciously accepted or mitigated, making the IDD a recurring building block in the asset’s documentation chain.

 

Red Flags and Risk Translation

IDD often produces a mix of hard facts, allegations, and “noise.” Not every negative report is a dealbreaker. The art lies in determining when a finding constitutes a true Red Flag.

Patterns of recurring corruption, involvement in sanctions evasion via dubious intermediaries, or repeated regulatory interventions point to structural integrity problems. Long-standing controversies regarding human rights or environmental issues in the supply chain also fall into this category.

The next step is always the same: translating fact into risk.

  • How old is the issue and how was it resolved?
  • Was it an isolated incident or a pattern?
  • What remediation measures have been taken since?
  • What does this mean for strategy, permits, and stakeholders?

This analysis determines whether to proceed, under what conditions, and with what additional safeguards.

 

Roles: Board, Compliance, and Researchers

A successful IDD requires clear responsibilities:

  • Board/M&A Teams: Define the risk appetite and make the final go/no-go decision.
  • Compliance & Legal: Translate that appetite into concrete research questions and reporting formats.
  • External Forensic Researchers: Conduct in-depth OSINT and reputational research, including anti-corruption tracks (FCPA/UKBA/Sapin II).
  • Financiers: Expect projects to be demonstrably tested against integrity, ESG, and governance standards.

 

Conclusion: From Deal DD to KYC

IDD is the “front end” of the same field where integrity investigations and whistleblower cases form the “back end.” What you do not sufficiently investigate before saying “yes,” you are likely to encounter later as an incident, investigation, or crisis.

In the next article in this series, we will shift the focus from one-time deal DD to daily practice: KYC (Know Your Customer) screening and CDD (Customer Due Diligence). We will explore how to translate the principles of IDD into ongoing monitoring, UBO verification, and PEP screening throughout the entire customer relationship.

 

Get in touch

Dennis van der Meer | +31618948848 | dennis.van.der.meer@compliancechamps.com

Boy Custers | +31649935735 | boy.custers@compliancechamps.com

 

Read more articles here.

The 80/20 Gap: Why Most AML/CFT Audits Miss the Mark and How to Join the Effective Few

The Illusion of Compliance 

Imagine the following: Your organization has a seemingly perfect AML/CFT audit program. Everything is meticulously documented, reports are delivered on time, and the regulator leaves after the latest inspection with a reassuring verdict. On paper, everything is correct. 

And yet—one year later—a multi-million dollar fine follows. Or worse: your organization hits the headlines due to involvement in a money laundering scandal that went unnoticed for years. 

 

What went (likely) wrong?  

The uncomfortable truth is that it is rarely a lack of rules, processes, or even expertise. The problem lies in the fundamental approach. Our market observation shows that approximately 80% of audits have subconsciously started believing in false security: treating compliance as an administrative end goal rather than risk management as a continuous process. The result? Audit programs that revolve around checkmarks and tickets, but fail to detect real risks and deviant behavior. 

In this article, we unravel: 

  • Why audits often remain superficial (and how to pierce through that surface). 
  • The three biggest pitfalls for audit teams. 
  • How to make the shift to the 20% of organizations that actually add value. 

 

1. False Security: “We Are Compliant”

In practice, an AML/CFT audit is still too often viewed as a mandatory “check-the-box” exercise. This mindset leads to audits that primarily prove that processes exist, but not whether they hold up under pressure. 

Reports are filled with confirmations that policies are in place, controls are set up, and procedures are followed. But the question that is rarely truly answered is: does it actually work in practice? Furthermore, audits often focus on the “low-hanging fruit,” such as the administrative completeness of customer onboarding. More complex subjects—such as the effectiveness of advanced transaction monitoring or the integrity of decision-making regarding abnormal behavioral patterns—often remain underexposed. 

The 20% who make an impact shift the focus from process compliance to effectiveness compliance. An effective program is not about checking off rules; it’s about exposing vulnerabilities before a criminal finds them. 

 

2. The Three Biggest Pitfalls in AML/CFT Audits

I. Tunnel Vision: Looking at What You Already Know

Auditors often focus on known risks and existing checklists. This provides a sense of security but creates significant blind spots. New threats—such as complex fraud structures, crypto-related risks, or advanced laundering methods—remain out of sight. When an audit concludes with “no significant findings,” it is often not a sign that everything is in order, but a signal that the audit did not look deep enough. 

 

How to tackle this:

  • Steer toward ‘Event-driven’ scopes: Stop auditing just “because it’s on the annual plan.” Focus on areas where the market or the organization is changing (e.g., new product-market combinations). 
  • Use technology as a mirror: Use data analytics to discover patterns that manual sampling misses, but remain critical of data quality. 
  • Broaden the perspective: Involve external specialists (e.g., SIRA or sanctions experts) to challenge your own assumptions. experts) to challenge your own assumptions.

 

II. Paper Compliance: The Gap Between Policy and Practice

Many organizations have excellently documented processes. On paper, it all adds up. But in practice, deviations occur. Employees skip steps because processes are too cumbersome; monitoring tools generate so many alerts that real signals get lost in the noise; training is completed but does not lead to a change in behavior. 

How to tackle this: 

  • Mystery Shopping / Walk-through tests: Test the process by guiding a fictitious, high-risk customer through onboarding. How easily do they slip through? 
  • Measure ‘Output Quality’: Don’t just look at whether an alert was handled, but whether the handling actually mitigated the risk. 
  • Feasibility Check: If a rule is not followed, the employee is often not the problem—the process is. Dare to name this. 

 

III. The “Audit as End Point” Pitfall 

An audit report is delivered, discussed, and then filed away. Recommendations fade into the background, follow-up is lacking, and the organization returns to business as usual. In such an environment, audit is seen as a control mechanism rather than an improvement tool. 

How to tackle this: 

  • Make audit findings SMART: Specific, Measurable, Achievable, Relevant, and Time-bound. 
  • Involve the business in the solution: Let those who execute the process help think of improvements. Additionally, appoint someone responsible for the solution. 
  • Communicate results: Show that audit is not just about “checking” but also about adding value. 

 

3. How to Reach the 20%: Practical Steps for an Effective Audit 

Step 1: Prioritize Impact, Not Completeness Not every risk deserves the same attention. Effective audit teams make sharp choices. They focus on the areas where probability and impact are highest: high-risk customers, complex or abnormal transactions, and behavior within the organization that puts rules under pressure. This requires daring to abandon standard checklists. 

Step 2: Use Data to Discover Blind Spots Many audits confirm what is already known. The real value lies in discovering blind spots. By actively using data analysis, patterns can become visible that otherwise remain hidden—such as unusual transaction flows or structural exceptions in processes. 

Step 3: Make Audit a Continuous Process, Not a One-time Check Risks change constantly, but audits often only take place periodically. By continuously monitoring critical processes and conducting shorter, thematic ‘deep dives,’ audit becomes an integral part of risk management rather than an annual exam. 

  • Tip: Create an ‘audit roadmap’ with priorities and deadlines, and communicate this to management. 

Step 4: Measure the Impact of Your Audit Ultimately, it is not about delivering reports, but about realizing improvement. Ask: Are risks identified faster? Do signals lead to action? Does behavior within the organization actually change? 

 

4. Conclusion: From Superficiality to True Risk Awareness 

In this approach, audit shifts from a monitoring function to a strategic partner in risk management. Most AML/CFT audits fail because they only check boxes, focus on paper rather than behavior, and result in no action being taken. 

The solution? An audit program that: 

  • Truly exposes risks (not just checking if they are “documented”). 
  • Uses technology and data to find blind spots. 
  • Stimulates business engagement and enforces action. 

 

Invitation for Consultation 

We can imagine that after reading this article, you may have questions or wish to exchange thoughts on specific topics or a concrete case. We invite you to contact us without obligation. Our contact details can be found on our website. 

Preview of the Next Article:

In the next article, we dive deeper into the three biggest ‘blind spots’ that even the sharpest AML/CFT auditor can overlook: culture, data, and human behavior. How is it that organizations think they are compliant while criminals find their greatest opportunities right here? Prepare for an honest check: which blind spot do you recognize in your team? 

Get in touch

Dennis van der Meer | +31618948848 | dennis.van.der.meer@compliancechamps.com

Boy Custers | +31649935735 | boy.custers@compliancechamps.com

 

Read more articles here.

AML/CFT Internal Audits: The Invisible Battle

 

AML/CFT internal audit is more critical than ever. Not because the regulator says so, but because the cost of failure has become unbearable. Massive fines, ruined reputations, and intrusive supervisors are no longer just “risks”—they are realities. 

And yet, it’s striking how conversations about AML/CFT audits always seem to get stuck in… theory. Regulatory frameworks. Best practices. Core principles everyone already knows. It’s safe. It’s correct. And frankly: it’s meaningless.

In the real world, things rarely fall apart because someone didn’t know the rules. Things fall apart because audits aren’t sharp enough. Because risks are overlooked. Because no one dares to ask the uncomfortable questions. 

That is exactly what this series is about. Not how it should work on paper, but where it actually goes wrong in the trenches.

Behind many audit reports lies a hidden reality: organizations that look “compliant” but are structurally missing the mark. Audits that neatly check every box while completely ignoring what actually matters.

Over the coming weeks, we will expose this reality in our series:
“AML/CFT Internal Audits – The Invisible Battle” 

No dry theory. No standard corporate talk. Just the patterns we see time and again that determine whether an audit adds value… or merely creates a false sense of security. 

 

We’re kicking off with four topics that will likely feel painfully familiar: 

  1. Why 80% of AML/CFT audits fail (and how to be part of the 20%):
    On the illusion of compliance—and why “good on paper” is often dangerous.
  2. The 3 Biggest Blind Spots in AML/CFT Audits:
    Culture, data, and human behavior—the risks your audit report rarely captures.
     
  3. The Uncomfortable Truth: Internal Audit vs. The Business:
    What happens when critical findings collide with commercial reality? 
    Who really wins? 
  4. AML/CFT Audits in 2026: Why the old ways are dead:
    New forms of financial crime—and audits that simply aren’t equipped to fight them.
     

And after that?

We go even deeper. We’ll dive into the hidden consequences no one prepares for, the behind-the-scenes forces that influence audit outcomes, and why solid findings often lead to zero action. 

This series is for everyone in the AML/CFT space who dares to ask: 

“Are we doing the right thing… or just what’s expected of us?” 

Follow the series and start by asking yourself that very question. 

 

 

What’s next in this serie

In the next article, we analyze the three biggest blind spots in AML/CFT audits and why risks are consistently overlooked in these areas

Get in touch

Dennis van der Meer | +31618948848 | dennis.van.der.meer@compliancechamps.com

Boy Custers | +31649935735 | boy.custers@compliancechamps.com

 

Read more articles here.

The Landscape of Compliance Investigations: Employment Law Investigations: The Investigative and Legal Side

Employment law investigations after suspicions of misconduct in the workplace: how do you approach them, what sanctions do you apply?

By Dennis van der Meer and Lydia Milders (employment lawyer)

Introduction

You suspect that your employee is sharing confidential company data with third parties or is competing unlawfully – what are the research possibilities? And what disciplinary measures do you take prior to, during, and after the investigation? 

Employment law investigations form the link between compliance signals about misconduct in the workplace and concrete personnel measures. A report about unauthorized side activities, theft of confidential information, or transgressive behavior ultimately leads to the question: which sanction is appropriate, and does it hold up in a procedure? 

In this fifth article in our series Compliance Investigations, we describe how these investigations proceed in practice. Dennis van der Meer highlights the forensic and factual side, while Lydia Milders (Milders law) sets out the legal frameworks and pitfalls. Together, we provide as complete a picture as possible of what HR, compliance, and management must know to allow an employment law investigation to proceed successfully – and which disciplinary measures can be applied. 

From signal to employment law investigation

Employment law investigations often start as a logical follow-up to earlier reports: a manager who passes information to competitors, an integrity signal about unauthorized side activities, or a finding that an employee has copied customer data. As soon as the facts are sufficiently concrete, the focus shifts to the individual employee and the employment law consequences. 

That transition is not self-evident. A trade-off must be made: is there enough to investigate further, and if so, how deep do you dig? In this regard, two central tensions play a role: 

Proportionality versus depth

The investigation must be firm enough to be able to support a possible sanction – from warning to dismissal. But it may not go further than necessary. A too-invasive investigation can be deemed disproportionate, certainly if it appears afterwards that the suspicion was unfounded. The art is to align the research means with the seriousness of the suspicion. 

Speed versus diligence

In the case of serious suspicions – for example, of fraud or theft – you want to act quickly to prevent further damage. At the same time, the investigation must be diligent: the employee must be heard, findings must be recorded, and the file must withstand the test of the judge. He who shifts gears too quickly risks an incomplete file; he who waits too long can be blamed for not having intervened adequately. 

And the GDPR? Employment law investigations by definition process personal data, so GDPR-awareness is required. In employment law practice, however, this rarely forms an obstacle. Below we go further into that. 

The end result of the investigation must in any case be resistant to legal testing. That means: a clear file, a traceable investigation process, and findings that hold stand in a possible procedure at the Subdistrict Court (kantonrechter). 

Three typical scenarios

Employment law investigations often revolve around concrete behaviors that damage the employment relationship. Three common situations: 

Scenario 1: Unauthorized sharing of company secret and competition-sensitive information

A sales manager is suspected of funneling confidential customer data and pricing information to a new employer. The investigation focuses on the use of an own device for work mail, downloads of CRM data, correspondence with external parties, and possible side activities. 

Scenario 2: Dereliction of duty through side activities

A controller runs, alongside his employment, his own consultancy firm in the same industry and advises customers who also work for the employer. It is investigated whether the side position was reported, whether working hours were used for private purposes, whether there is overlap with the customer base, and whether confidential information was leaked. 

Scenario 3: Transgressive behavior

Reports about inappropriate remarks, abuse of power, or (sexually) intimidating behavior from a manager toward juniors. Here, the investigation revolves around patterns: are there multiple reporters, WhatsApp groups, witness statements, and HR interviews? 

In all these scenarios, privacy questions also play a role. The legal framework for that is addressed further on. 

The forensic approach in employment law investigations

Financial investigation and data analysis

In breach of trust cases, investigators check expense claims, travel and accommodation costs, and use of company resources. Data analysis detects unusual patterns in hour registration or claims that point to side activities. 

Digital forensic investigation

Mail traffic, chat history, CRM access, and device use are secured. In employment law investigations, forensic imaging of work devices is often essential, but immediately raises privacy questions. Mailboxes at external IT-administrators form a practical problem: without clear agreements, access can cause delay. 

In the case of larger volumes, eDiscovery comes into view: WhatsApp groups, Slack channels, and email around incidents are filtered with keyword searches and AI clustering. Privacy infringement is minimized by a focus on work-related data and redaction of private messages. 

Interviews and hearing/rebuttal (hoor/wederhoor)

Conversations with the suspect, reporters, and witnesses are crucial, but ask for finesse. The suspect is presented with concrete accusations with hearing and rebuttal. Recordings only with explicit permission. 

It is of importance that the accused is presented with accusations as concrete as possible, so that he or she can defend themselves well. That is generally not possible with anonymous reports, unless the report contains sufficiently concrete facts that can be presented without revealing the reporter. Anonymous reports can therefore usually form no independent basis for a person-oriented investigation, but can give cause for a general culture or signals investigation. 

Open source investigation

Investigation can be performed in various open sources, whereby among other things side positions, Chamber of Commerce (KvK) registrations, LinkedIn, and media are screened to test statements made. 

Legal framework on the basis of scenarios

  1. Violation of confidentiality obligation

Inthe case of suspicions of sharing company secret information with third parties, the contractual confidentiality obligation is usually central. Often, high fines are set on violation. Additionally, good employership (Art. 7:611 Dutch Civil Code) plays a large role: the employee owes loyalty to the employer and may not just share confidential company information with third parties, certainly not with competitors. 

The legal route depends on the seriousness of the violation. In the case of proven violation of the confidentiality clause or theft of company data, summary dismissal (Art. 7:677 jo. 7:678 DCC) is obvious, provided the urgency requirement is met. In the case of less serious violations – or when the employer wants to avoid the risk of a failed summary dismissal – he can choose dissolution due to culpable acting (e-ground) or a disrupted employment relationship (g-ground). 

The burden of proof lies with the employer. He must demonstrate that the shared information concerns company secrets and that the employee has acted culpably. 

  1. Side activities and conflict of interest

Side activities are not by definition prohibited, but are limited by the employment contract, possible side-work clauses, and the doctrine of conflict of interest. Since the Implementation of EU Directive on Transparent and Predictable Working Conditions Act (August 2022), it applies that a side-work clause is only valid if the employer can put forward an objective justification ground. A general prohibition on side-work is therewith no longer tenable.

When side activities lead to conflict of interest – for example because the employee serves customers of the employer via an own enterprise – this can yield dereliction of duty and be ground for dismissal due to culpable acting (e-ground). In serious cases, such as actively competing with the employer or funneling away customers, an urgent reason can even exist. 

  1. Transgressivebehaviour

Transgressive behaviour falls under the statutory duty of care of the employer for a safe working environment (Art. 7:658 DCC and the Working Conditions Act). The employer is obliged to take (preventative) measures against unwanted behaviour and must do (or have done) investigation in the case of signals. 

The appropriate sanction depends on the seriousness of the behaviour, the context, possible repetition, and the position of those involved. A one-time inappropriate remark generally justifies no dismissal, but structural intimidating behaviour by a manager can justify firm disciplinary measures, including dismissal. 

The burden of proof is often complex: it usually concerns contradictory statements – word against word. A diligent investigation with multiple witnesses, documentation of patterns, and application of hearing and rebuttal is essential to be able to take disciplinary measures that also hold stand in law. 

Privacy and GDPR

In an internal investigation into fraud or other abuses, privacy always comes around the corner. In employment law practice, however, the impact is usually not too bad. In the case of concrete signals of fraud, conflict of interest, or other serious integrity violations, the employer is generally given a lot of space by the judge to do investigation. 

The Supreme Court made this clear already in 2001 in the Wennekes Lederwaren judgment (HR 27 April 2001). An employer had hung up a hidden camera because of a suspicion of embezzlement. The employee appealed to privacy and wanted the images to be left out of consideration. The Supreme Court did not go along with that: the employer had a justified interest, the suspicion was concrete, and the evidence could not be obtained in another way. Even in the case of an infringement on privacy, that does not yet mean that the evidence may not be used. 

That line has since then been maintained. In 2014, the Supreme Court formulated the general rule: in civil cases, unlawfully obtained evidence is in principle not excluded. The interest of truth-finding weighs heavier. Evidence exclusion is only an issue in the case of additional circumstances, and that threshold lies high. 

The GDPR of course just applies, but does not stand in the way of an investigation. The basis is usually the justified interest of the employer (Art. 6 paragraph 1 sub f GDPR). In fraud cases, that balancing of interests almost always turns out in favour of the employer. 

In short: document the investigation well, record the GDPR-basis, and perform the investigation decently. But do not let yourself be paralyzed by privacy concerns if there are serious signals on the table. The chance that a judge keeps the evidence outside the door is – provided the investigation is performed diligently and proportionally – very small. 

Suspension as an interim measure

Consider placing the employee on non-active status immediately after the first serious signal, with retention of salary. This gives space for investigation without the employee having access to systems or colleagues, and emphasizes that the employer takes the matter seriously. 

The employee can challenge the suspension via preliminary relief proceedings (kort geding). The judge then assesses whether the suspicion is sufficiently concretely substantiated, whether hearing and rebuttal has been applied, whether the measure is proportional, whether the suspension has come about procedurally diligently, whether alternatives have been considered (such as coaching, warning, or a conversation), and whether the employer is not unacceptably anticipating a dismissal procedure. 

Dismissal routes: which do you choose when?

The choice between the different dismissal routes depends on the seriousness of the misconduct, the strength of the evidence, and the risk appetite of the employer. 

Summary dismissal (urgent reason)

Summary dismissal is the most drastic sanction and requires an urgent reason (Art. 7:677 jo. 7:678 DCC). Examples from the law are theft, embezzlement, threat, and gross insult, but also serious violation of the confidentiality obligation or unlawful competition can yield an urgent reason. The employer must communicate the urgent reason to the employee without delay; this means as quickly as possible after the person authorized to make decisions has become familiar with the facts. 

The risk of summary dismissal is considerable: if the judge rules that no urgent reason existed or that it was not acted upon without delay, the employee can have the dismissal annulled. This can lead to reinstatement of the employment agreement with back pay. If the employee does not choose annulment but acquiesces in the dismissal, he can instead make a claim to a fair compensation (billijke vergoeding) which, in the case of an unjustified summary dismissal, is often substantial. 

Dissolution due to culpable acting (e-ground)

When the behavior is culpable but possibly insufficiently serious for summary dismissal – or when the employer wants to avoid the risk of a failed summary dismissal – he can choose a dissolution request at the Subdistrict Court due to culpable acting (e-ground, Art. 7:669 paragraph 3 sub e DCC). The judge tests whether the acting or omitting is so culpable that it cannot in reasonableness be required of the employer to let the employment agreement continue. In the case of seriously culpable acting, the judge can rule that no transition payment is due; in the case of “normal” culpable acting, this is due. 

In the case of doubt about the seriousness of the misconduct or about the expeditiousness of the investigation, the employer often chooses a dissolution request via the Subdistrict Court: less risk, more procedural certainty. 

Cumulation ground (i-ground)

Since 2020, the employer can make an appeal to the cumulation ground (Art. 7:669 paragraph 3 sub i DCC) when there is a combination of circumstances from multiple dismissal grounds that are individually insufficient, but together do justify a dismissal. Upon allocation on the so-called “i-ground,” the judge can award an extra compensation of maximum 50% of the transition payment. 

The i-ground is especially useful when the employer has multiple “half” grounds – for example, partly culpable acting and partly a disrupted employment relationship. The disadvantage is the possible extra compensation, but that sometimes outweighs the certainty of dissolution. 

Settlement Agreement (VSO)

In practice, a large part of employment law disputes is resolved via a VSO. The strength of the investigation file determines the negotiation position: a watertight file generally leads to a quick VSO on terms favorable to the employer, while a weaker file gives the employee more negotiation space. 

Investigation duration and the urgency requirement

An important point of attention in summary dismissal is the tension between investigation duration and the urgency requirement. The employer does not have to act overhastily – a diligent investigation is precisely required to establish the facts well. However, the employer must act expeditiously during the investigation and be able to account for why the investigation took the time that it took. 

Concretely this means: document the investigation timeline accurately, avoid unnecessary pauses, and consider suspension as an interim measure. The “without delay” (onverwijldheid) starts to run at the moment that the employer (usually: the person who is authorized for dismissal) has sufficient certainty about the facts. The obtaining of legal advice or the waiting for an investigation report can suspend this term, provided this happens expeditiously. 

The hearing of the employee prior to the dismissal is not a statutory requirement, but is strongly recommended. Giving the employee the opportunity to react to the findings strengthens the legal position. 

Judges accept investigation periods of several weeks, sometimes even months in complex fraud cases, provided the employer can demonstrate that he acted expeditiously. 

From findings to employment law decision

An employment law investigation ends with a report that meets three requirements. Firstly, factual separation: hard facts are separate from interpretation and without legal interpretation (which is reserved for the legal advisors). Secondly, reproducibility: the methodology must be traceable for the Subdistrict Court. Thirdly, privacy-proof: which data was processed, on which basis, and how is it secured? 

The report forms the basis for the decision-making of the employer. That decision-making follows a sanction ladder: from written warning, via salary suspension and dismissal with mutual consent, to dismissal via the Subdistrict Court or summary dismissal. The central question is always: is the file strong enough for an urgent reason (summary dismissal) or for culpable behavior (dissolution)? Alternatives such as mediation, redeployment, or temporary adjustment of the function always remain in view. 

Trends and points of attention

Professional investigation, prevent paying fair compensation: from much case law it follows that employers drop stitches in (having done) good investigation, and the correct application of hearing and rebuttal. With the consequence that a high fair compensation must be paid to the employee because of seriously culpable behavior of the employer (think of on average 4 – 12 monthly salaries, or more). This emphasizes the importance of a thorough and independent investigation, in the case of suspicions of (serious) misconduct in the workplace. 

Whistleblowers Protection Act (Wbk): it occurs that a whistleblower who reports an abuse, himself also becomes subject of investigation – for example because he is suspected of involvement in the reported facts, or because his report is seen as an attempt to mask own misconduct. This yields a particular area of tension. The Wbk protects reporters against disadvantage, but that protection is not absolute: if the reporter himself has acted culpably, the employer can do investigation into that and if necessary impose sanctions. The art is to keep both tracks – the protection of the reporter and the investigation of possible misconduct – procedurally pure and to document well why certain measures are taken. 

AI and data-analysis: advanced tools make it possible to detect patterns faster in large datasets, but ask for awareness of the limits. 

Hybrid working: the use of private devices and working from home makes the forensic boundaries more difficult to guard and asks for clear agreements beforehand (in code of conduct, handbook etc.). 

Forensic readiness remains crucial: logging on, clear IT-contracts, protocols for incidents, and training of key users in data preservation. 

Finally

For employment law practice it applies; take the time that is necessary for a sound investigation, but let no gaps fall. Document every step and be able to explain afterwards why the investigation had the lead time that it had. Disciplinary measures (including dismissal) can only be applied after diligent investigation and sound application of hearing and rebuttal, and serve always to be proportional. 

Outlook: due diligence investigations

In the sixth article, the focus shifts to due diligence and reputation research: how do you screen external parties before acquisitions, partnerships, or large contracts? Forensic methods, OSINT, and integrity checks come together in a preventative approach. 

 

Get in touch

Dennis van der Meer | +31618948848 | dennis.van.der.meer@compliancechamps.com

Boy Custers | +31649935735 | boy.custers@compliancechamps.com

 

Read more articles here.

Whistleblower Investigations: From Report to Real Change

Whistleblowers are indispensable for exposing (serious) wrongdoing. Yet it is the follow-up to a report that determines whether an organization is truly acting with integrity or merely maintaining a paper reality. Since the introduction of the Dutch Whistleblower Protection Act (Wet bescherming klokkenluiders, Wbk), the playing field has become more strictly regulated. But how do you translate an ‘unexpected’ report into a sound fact-finding investigation and, ultimately, into lasting change?

Whistleblower Investigations: From Report to Real Change

Whistleblowers are indispensable for exposing (serious) wrongdoing. Yet it is the follow-up to a report that determines whether an organization is truly acting with integrity or merely maintaining a paper reality. Since the introduction of the Dutch Whistleblower Protection Act (Wet bescherming klokkenluiders, Wbk), the playing field has become more strictly regulated. But how do you translate an ‘unexpected’ report into a sound fact-finding investigation and, ultimately, into lasting change?

A Legal Patchwork: Wbk, Wwft, and Sector-Specific Legislation

The Wbk requires organizations with 50 or more employees to establish an internal reporting procedure and an appropriate investigation process. However, for many sectors, the Wbk is merely the baseline. A lex specialis applies: specific laws that often impose even stricter requirements on reporting channels. Consider, for example:

  1. Law: Wwft (Anti-Money Laundering and Anti-Terrorist Financing Act)
    Sector: Financial institutions, legal profession, accountancy, etc.
    Focus: Money laundering and terrorist financing.
  2. Law: Wft (Financial Supervision Act)
    Sector: Financial institutions, insurers, investment firms, etc.
    Focus: Financial integrity and market abuse.
  3. Law: Wta (Audit Firms Supervision Act)
    Sector: Audit firms
    Focus: Breach of professional rules and independence.
  4. Law: AVG (GDPR)
    Sector: All sectors
    Focus: Data breaches and privacy violations. 

The risk for organizations is a fragmented landscape of different “counters.” The trend is therefore to deploy a single centralized, multi-compliant reporting platform that routes reports based on their subject matter directly to the appropriate expert (such as the Compliance Officer or an external whistleblower officer), while safeguarding anonymity and statutory deadlines.

Looking Beyond Your Own Organization

Forward-thinking organizations are now also opening their reporting channels to supply chain partners, such as suppliers and self-employed contractors. Although strict reporting obligations such as the CSRD and CSDDD have been pushed to the background for some companies due to the introduction of the Omnibus Directive, the societal necessity remains as pressing as ever.

From the perspective of social responsibility, there is every reason to maintain visibility over integrity beyond one’s own walls. For insurers, this is even a bitter necessity: under the Wft, they are co-responsible for the integrity of business operations throughout their entire distribution chain (such as authorized agents).

A fundamental question remains: how do you ensure that all those signals, from both inside and outside the organization, actually come to light? Social responsibility and legal frameworks create the duty to listen, but they do not yet guarantee that people will actually dare to speak up. That requires more than a policy choice; it requires trust in the reporting process itself.

This brings us to the starting point of every whistleblower investigation. Whether wrongdoing occurs within the organization or in the chain surrounding it, everything hinges on that first step: the report. How it is made, received, and followed up determines whether a signal grows into real change or remains unheard.

From Report to Real Change

I. The Report: How Do You Get Employees to Speak Up?

Every whistleblower case begins with a moment of doubt. An employee sees something that is not right, feels that something must be done, but hesitates. The biggest hurdle is seldom the substance of the report; it is the fear of what comes next. Reputational damage, a disrupted working relationship, or subtle forms of retaliation are ever-present risks. The Whistleblower Protection Act seeks to remove that fear through the reversal of the burden of proof: if a reporter suffers a disadvantage, the employer must demonstrate that this had nothing to do with the report. That provides a foothold, but it is far from convincing for everyone.

Anyone who truly wants to encourage employees to speak up must look beyond legal safeguards alone. Practice shows that trust is primarily built through the way reporting is designed. Accessible, well-considered technology plays a key role in this.

Modern reporting platforms act as quiet guides during that first, vulnerable stage. They ensure that a report does not get stuck in a general email inbox but is immediately routed to the right specialist: compliance, HR, or an independent whistleblower officer. This gives the reporter the feeling that their signal is being taken seriously from the very first moment.

Equally important is the ability to remain anonymous without disappearing into silence. Secure systems make it possible to report fully anonymously while still maintaining a dialogue. Through a shielded chat function, investigators can ask clarifying questions and gather additional information. In this way, an initial signal develops into a complete account, rather than a report that stalls because essential details are missing.

It is precisely in this initial phase that the tone is set. When employees experience that speaking up is safe, accessible, and meaningful, space is created for the next step: an investigation that not only establishes what went wrong but also paves the way for real change.

II. The Investigation: Independent Fact-Finding

After the report, a decisive moment follows. Receipt must be confirmed within seven days, but in reality, the real work only begins at that point. From here, more is at stake than truth-finding alone. The way the investigation is structured and conducted determines whether the case is resolved internally or instead grows into a matter that finds its way to the media or regulators such as the Dutch Authority for the Financial Markets (AFM) or De Nederlandsche Bank (DNB).

In this phase, independence is not an abstract principle but a hard prerequisite. An investigation conducted by someone with a hierarchical, personal, or organizational relationship to the accused quickly raises questions. Even if the conclusions are substantively correct, the appearance of conflicts of interest can undermine trust. It is therefore essential that investigators are visibly detached from internal power dynamics. Independence protects not only the reporter but also the organization itself.

In addition, a sound investigation revolves around transparency in its approach. Those involved must be able to follow how conclusions are reached. Are all relevant facts being gathered? Has the right of hearing and the right to reply (hoor en wederhoor) been applied carefully and in a balanced manner? A traceable methodology, based on verifiable evidence, prevents the investigation from later being dismissed as subjective or biased. The narrative must hold up, not only in terms of substance but also in terms of process.

A particular area of tension arises when the investigation no longer focuses exclusively on the report but also on the reporter. In practice, it regularly occurs that a so-called ‘counter-report’ surfaces: criticism of the performance or behaviour of the reporter. This can be legitimate but also poses a risk. When these lines become blurred, attention shifts imperceptibly from the content of the report to the person who made it.

A thorough investigation strictly guards that boundary. The facts surrounding the report are examined on their own merits; any HR matters follow a separate track. Only in this way does the investigation remain pure and is it prevented from degenerating into a battle over credibility rather than a search for the truth.

It is precisely in this phase that an organization demonstrates how seriously it takes reports. Independent, thorough fact-finding forms the bridge between speaking up and resolution, and thereby the foundation for lasting change.

What makes whistleblower investigations unique is that they take place at the intersection of facts, trust, and power. Unlike regular internal investigations, it is not only the what that is central but also the who and why. The reporter is not a neutral source but is often part of the same organizational culture that is under scrutiny. This demands of investigators a keen sense of context, dynamics, and timing. Every signal, every choice in the process can be read by those involved as confirmation or denial of their position. Precisely for this reason, whistleblower investigation is more than a technical exercise: it is a ‘test’ of the organization’s own integrity, in which thoroughness and independence are decisive for the credibility of the outcome.

III. The Change: Impact and Culture

A whistleblower investigation does not end with the report. In fact, that is where the most exciting part begins. Facts can be established, conclusions carefully formulated, but without follow-up, an investigation remains a paper reality. The true measure of success is the question of whether the organization demonstrably learns from it and manages to restore its integrity.

This requires a translation of findings into structural lessons. Sometimes a report turns out to concern a one-time incident caused by individual choices. More often, however, it exposes something more fundamental: unclear responsibilities, deficient internal controls, or a culture in which dissenting signals have been ignored for too long. It is precisely at that point that real change occurs, not by pointing out those at fault and moving on, but by critically examining processes, governance, and behavior, and adjusting them where necessary.

Equally decisive is what this phase does for the sense of safety within the organization. Psychological safety does not grow through policy documents but through visible action. When the board and management communicate openly about what has happened with the report, within the boundaries of confidentiality, and demonstrate that wrongdoing actually has consequences, perceptions change. Especially when those consequences also reach the top, a powerful signal is sent: integrity applies to everyone.

It is in these visible choices that the long-term impact of whistleblower investigations lies. They determine whether employees remain silent the next time or dare to speak up. And with that, whether reporting is seen as a risk or as an essential part of a healthy organizational culture.

Conclusion

Whistleblower investigations require a balance between legal precision and human safety. It is a process from report to improvement that forms the backbone of an organization with integrity.

Invitation to Consultation

We can imagine that, after reading this article, you may have questions or wish to exchange views on certain topics. Or perhaps you are dealing with a concrete case and would like to discuss it. We invite you to contact us without obligation for an introductory conversation about you and/or your case. Our contact details can be found at the end of this article or on our website.

Preview of the Fifth Article: Employment Law Investigations

In the next article in this series, the focus shifts from whistleblowers to employment law investigations. This is where many threads converge: what happens when a report or integrity issue leads to a serious suspicion of dereliction of duty, breach of trust, or (serious) integrity violations by an individual employee? We will address the role of fact-finding within employment law proceedings, the tension between investigation and privacy, and the question of how organizations prevent a poorly prepared investigation from later boomeranging during a dismissal or disciplinary procedure.

Get in touch

Dennis van der Meer | +31618948848 | dennis.van.der.meer@compliancechamps.com

Boy Custers | +31649935735 | boy.custers@compliancechamps.com

 

Read more articles here.

Tackling ML/TF risks in crypto-asset services through supervision

A comprehensive summary of the EBA report as published in October 2025

General overview

The report published by the European Banking Authority (EBA) analyses how crypto-asset service providers (CASPs) have attempted to evade anti-money laundering and counter-terrorist financing (AML/CFT) supervision, and how such practices can be addressed under the Markets in Crypto-Assets Regulation (MiCA) and the EU AML legislative package (AMLR, AMLD6 and AMLAR). The report draws on concrete supervisory cases to identify vulnerabilities and formulate lessons for effective implementation.

The report is structured around two core observations. First, the crypto-asset sector has experienced rapid technological and economic growth, which increases its vulnerability to misuse for money laundering and terrorist financing. Second, prior to the application of MiCA, national supervisory approaches across Member States diverged significantly. This fragmentation enabled firms to exploit regulatory gaps, thereby undermining the integrity of the EU financial system.

MiCA seeks to address these issues by replacing fragmented national entry regimes with a single EU authorisation framework, supported by passporting and coordinated supervision. Together with the AML legislative package, MiCA promotes more consistent AML/CFT requirements across the Union. However, the report stresses that consistent enforcement remains essential.

Regulatory context

The regulatory framework examined in the report consists of MiCA, the Anti-Money Laundering Regulation (AMLR), the Sixth Anti-Money Laundering Directive (AMLD6), and the Anti-Money Laundering Authority Regulation (AMLAR). Under this framework, supervisory responsibilities are divided between ESMA (authorisation and supervision of CASPs), the EBA (issuers of asset-referenced tokens and e-money tokens, and AML/CFT coordination until end-2025), and AMLA, which will assume central AML/CFT supervisory powers from the end of 2025.

MiCA governs who may enter the crypto-asset market and under which conditions. CASPs must meet requirements relating to governance, operational resilience, transparency and consumer protection, and demonstrate adequate systems, qualified management and clear organisational structures.

AMLR introduces directly applicable AML/CFT rules, including customer due diligence, transaction monitoring, sanctions screening and risk management. AMLD6 strengthens supervisory cooperation, clarifies powers of national authorities and improves access to beneficial ownership information. AMLAR establishes AMLA and enables direct supervision of selected high-risk entities and coordination of national supervisors.

Evasion of supervision

The EBA identifies six evasion strategies observed before and immediately after the entry into application of the new regulatory framework in December 2024.

1. Operating without authorization

Entities provided crypto-asset services in Member States without the required registration, licence or authorisation, including from other EU jurisdictions without host permission or from third countries with weaker supervisory frameworks.

Risk: The absence of supervision facilitates illicit financial flows and leaves customers unprotected. It also distorts competition, as authorized firms experience significant compliance costs that unauthorised firms avoid.

Response: Article 143 MiCA provides transitional arrangements until July 2026. After this period, unauthorised entities must exit the EU market. Competent authorities are expected to monitor residual unauthorised activity and enforce cessation.

2. Forum shopping

Prior to MiCA, firms strategically selected jurisdictions perceived as having lighter supervision. When challenged, they withdrew applications and reapplied elsewhere. Some obtained national licences shortly before MiCA entered into application to benefit from longer transitional periods.

Risk: Forum shopping enables regulatory arbitrage, allowing ML/TF risks to spread across the Single Market through cross-border activity. It also increases the likelihood that high-risk entities with weak AML/CFT controls obtain market access and distorts competition by enabling artificially inflated profit margins.

Response: MiCA introduces a single authorisation regime with passporting. Enhanced supervisory cooperation and information-sharing reduce the ability of firms to reapply elsewhere after refusal. The report also highlights a risk that, depending on national law, some firms may continue operating while appealing rejected authorisation decisions.

3. Exploitation of the reverse solicitation exemption

Third-country providers falsely claimed that EU clients initiated contact, while actively marketing services through targeted online strategies.

Risk: This enables unsupervised market entry by high-risk offshore entities and creates blind spots in AML/CFT enforcement.

Response: Supervisors are expected to strictly enforce the narrow interpretation of reverse solicitation in line with ESMA guidelines. Any form of active or indirect marketing voids the exemption and subjects the provider to full authorisation requirements.

4. Weak AML/CFT compliance and risk management

Licensed entities displayed serious deficiencies, including inadequate customer due diligence, outsourcing of AML functions abroad without effective oversight, and unstable or underqualified compliance officers.

Risk: These weaknesses directly facilitate money laundering and undermine supervisory effectiveness.

Response: Robust AML/CFT systems are a precondition for authorisation. Supervisors may withdraw licences for AML/CFT breaches. Clear requirements on outsourcing, governance and staff competence are mandated by EBA and ESMA regulatory technical standards.

5. Opaque beneficial ownership and governance

Complex offshore structures were used to obscure ultimate beneficial owners, with inconsistencies between public records and supervisory filings.

Risk: Opaque structures conceal control, enable shell companies and obscure illicit sources of capital.

Response: AMLD6 mandates centralised beneficial ownership registers. MiCA and AMLR require disclosure of ownership and governance structures at authorisation stage, supported by suitability (fitness and propriety) requirements.

6. Multi-entity arrangements with high-risk partners

Firms used affiliated entities, including payment institutions, e-money institutions or banks, to maintain market access while avoiding scrutiny.

Risk: These arrangements enable banned or unfit entities to re-enter the market, spread poor compliance cultures across groups, and complicate attribution of AML/CFT responsibility.

Response: Supervisors are expected to assess linked entities and group structures during authorisation, apply fit-and-proper checks to cross-border ownership and outsourcing arrangements, and engage in joint supervision where appropriate.

Safeguards and implementation

MiCA introduces key safeguards: a single authorisation and passporting regime; strict limits on reverse solicitation; enhanced enforcement powers; strengthened governance and transparency requirements; and improved cross-border cooperation, including public registers of authorised CASPs.

The report highlights several supervisory priorities to ensure effective implementation, including managing the grandfathering period, planning orderly exits for unauthorised entities to protect client assets, monitoring the regulatory perimeter, resolving AML/CFT issues before authorisation, maintaining dynamic risk awareness, ensuring governance transparency, reassessing fitness and propriety, supervising linked entities, strengthening cross-border cooperation, and requiring central contact points for cross-border firms.

Conclusion

The EBA concludes that while the new regulatory framework significantly strengthens EU defences against ML/TF risks in the crypto-asset sector, effective implementation and supervisory cooperation remain critical. Although the EBA will transfer its standalone AML/CFT powers to AMLA by the end of 2025, it will continue to contribute under its MiCA mandate to promote supervisory convergence and early risk detection.

 

Read more articles here.

The Landscape of Compliance Investigations: Integrity Investigations

Integrity investigations form a substantial part of compliance-related inquiries. They do not focus solely on financial fraud but cover a broad range of issues: conflicts of interest, abuse of position, ancillary activities (side business or job), and violations of codes of conduct. While a fraud investigation often revolves around hard numbers and financial trails, integrity issues are usually more subtle. They concern human relationships, motives, and grey areas where rules and ethics intersect. 

Integrity is the foundation of trust within organizations. Yet integrity risks often go unnoticed, with far-reaching consequences for reputation, compliance, and business continuity. In this third article in our series, the focus is not on investigative techniques, but on what integrity investigations mean in practice: which themes recur, and which patterns emerge from recent cases. We discuss not only well-known integrity risks, but also the less obvious threats. 

We begin with a brief overview of the trends that shaped integrity investigations in 2025. We also briefly highlight the differences between integrity investigations and fraud investigations, discussed in the previous article. We then turn to practice: which cases recur, and how can signals be recognized? By doing so, we also shed light on several underexposed indicators. 

Trends in Integrity Investigations 

Integrity issues are shifting from a narrow focus on corruption and fraud toward broader domains such as conflicts of interest, reputational risk, and moral dilemmas. Recent developments show that: 

  • Conflicts of interest and their appearance are increasingly being reported, often in relation to ancillary activities, procurement processes, or decision-making where personal relationships play a role. 
  • Codes of conduct for board members, supervisory board members, and political officeholders are being tightened, with a strong emphasis on transparency regarding secondary interests and cooling-off periods. 
  • Supervisory authorities such as the AFM and DNB require reliability assessments for board members and supervisory board members, with explicit attention to integrity-related antecedents. 

These trends make integrity investigations more relevant than ever. They are not only reactive but also play a preventive role in promoting sound governance and an ethical organizational culture. Later in this article, we will see one of these trends reflected in a case example. 

What Makes Integrity Investigations Different from Fraud Investigations 

Compared to the forensic fraud investigation discussed in our second article, integrity investigations differ in several important ways: 

  • Greater normative discussion: While fraud investigations often focus on the question “Is there financial damage, and who is responsible?”, integrity investigations more frequently revolve around norm-setting: what could reasonably be expected of someone, which behavioral standards apply, and how heavily the appearance of impropriety and reputational risk should be weighed? 
  • Fewer hard figures, more context: Relationships, organizational culture, and power dynamics play a much larger role in integrity cases. A single email or expense claim rarely tells the whole story; only when combined with statements, behavioral patterns, and internal policies, a coherent picture emerges. 
  • Greater sensitivity regarding privacy and reputation: Investigations often involve individuals in visible or senior positions. This makes careful handling of personal data, communication, and the principle of hearing both sides particularly important. 

It is precisely this mix that makes integrity investigations both challenging and valuable for boards, HR, and compliance: they force organizations to articulate their values in concrete terms. 

Integrity Investigations: When Behavior Is Under the Microscope 

Where fraud investigations often focus on falsified documents, financial loss, and potential criminal elements, integrity investigations mostly operate in grey areas. They address questions such as which interests are at play, which norms apply, and what can reasonably be expected of a professional or manager? 

In practice, reports of potential conflicts of interest, ancillary activities, inappropriate conduct, and breaches of codes of conduct have been increasing for years, in both public and private organizations. To make this more tangible, we present a case example below. 

“You Don’t Want to Create an Uncomfortable Work Atmosphere, Do You?” 

A large family-owned logistics company is known for its reliability and customer focus. This sense of stability is disrupted when an anonymous report is submitted to the compliance officer. An employee in the procurement department is suspected to regularly accept expensive gifts from a supplier, ranging from lavish dinners to tickets for exclusive events. In isolation, this might seem harmless, except for the fact that this employee is responsible for awarding transport contracts. 

Further investigation reveals that the employee also holds a secondary position at a start-up operating in the same market. This start-up appears to be using competitively sensitive data, possibly obtained through informal conversations with the employee. 

But that is not all. Deeper investigation shows that the employee not only accepted gifts, but also subtly pressured colleagues to be “realistic” when reporting performance figures. Minor adjustments to reports, just enough to meet bonus targets. Colleagues had noticed signals but remained silent: “it wasn’t their department” and “you don’t want to create an uncomfortable work atmosphere.” 

What began as a simple report about gifts quickly unfolds into a web of conflicts of interest, a culture of looking the other way, and subtle data manipulation to justify performance bonuses. 

This case is not an exception. It illustrates precisely the trends mentioned earlier and shows how integrity risks often do not present themselves as such but grow gradually within the daily routines of organizations. It also demonstrates how different risks, such as conflicts of interest, ancillary activities, group pressure, and data manipulation, can become intertwined. 

In investigations of such situations, decision-making processes around procurement, documentation of bids and award decisions, email or calendar records, and publicly available information on ancillary activities are examined. These sources are analyzed collectively to answer three core questions: 

  1. Were there personal or business interests that could have influenced decisions? 
  2. Were these interests disclosed or made transparent, for example through a gift, activity register or integrity declaration? 
  3. Were decisions demonstrably different from what could reasonably have been expected, given price, quality, and internal policy? 

Outcomes are rarely black and white. Sometimes investigations show that no formal rules were violated, yet an appearance of a conflict of interest emerged, calling for clearer agreements to roles. In other cases, policies were deliberately circumvented or information withheld, making the violation of norms more explicit. 

Practical Indicators from Integrity Investigations 

Beyond the above case, other recurring types of integrity issues frequently arise in investigations. Some of the usual suspects include: 

  • A Culture of “Don’t Ask, Don’t Tell”: Perhaps the most damaging risk is a culture in which employees prefer to look away rather than ask questions. Many employees still hesitate to speak up for fear of repercussions or because they do not want to be seen as “complaining”. A typical example: an employee notices signals of misconduct but remains silent because “it’s not my department”. 
  • Data Manipulation: The Silent Saboteur: In the pursuit of targets and bonuses, there can be a strong temptation to present figures slightly more favorably than they are. At a financial institution in Rotterdam, a team leader was found to have adjusted customer satisfaction scores for months. “Everyone does it,” was his defense. The consequences, however, were significant: customer and supervisory trust eroded, and the organization was forced into a costly remediation process. With the rise of AI tools performing data analyses, this risk is only increasing. Who controls the controller? 
  • Conduct and Power Dynamics: Reports of inappropriate behavior, offensive remarks, or pressure from managers also fall under the scope of integrity, even if there is no financial component. These cases concern social safety, use of power, and whether behavior aligns with codes of conduct and professional standards. Investigations focus primarily on patterns: is the behavior incidental, or has it been known for years? 
  • Handling Confidential Information: A former employee is accused of taking confidential documents to a new employer. Key questions include whether confidentiality agreements were breached, whether files were copied without authorization, and whether sensitive information has surfaced where it should not be. Legal, technical, and behavioral issues intersect in such cases. 

These examples show that integrity investigations are not merely about “rules”. They are about trust, role modelling, and the credibility of commitments to integrity. Next to these more generally known integrity issues, we would like to address some underestimated issues. 

Underestimated Risks: What You Don’t See, but May Still Encounter 

Some less obvious, yet in our view highly relevant, risks deserve attention: 

  • Loyalty Conflicts: A growing phenomenon involves employees who run side businesses, perform consultancy work, or even hold secondary jobs with competitors. This is not inherently wrong, but it becomes risky when confidential information or conflicting interests are involved. Consider the IT employee who develops an app in their spare time using data from their primary job, or the procurement officer who also “coincidentally” works for a competitor. Organizations often fail to adequately monitor this, despite potentially severe consequences ranging from data breaches to legal claims. 
  • Group Pressure and Groupthink: Decisions are (often) made collectively, but what happens when critical voices are ignored? At a tech start-up in Amsterdam, pressure to scale rapidly led to ethical objections against a new data sales strategy being dismissed. The result was a breach of the GDPR, and a fine imposed by the Dutch Data Protection Authority. Group pressure can lead to tunnel vision, where alternatives and risks are no longer considered. A simple but effective solution? Explicitly appoint a “devil’s advocate” during meetings to challenge assumptions. 
  • Greenwashing: The Pitfall of Social Claims: Sustainability and corporate responsibility are high on the agenda. But what if reality falls short of promises? A clothing brand claiming to be “100% circular,” while in reality using only 10% recycled materials, risks not only reputational damage but also legal action. External verification of sustainability reporting is no longer a luxury, but a necessity. 

These examples show that integrity risks are not always visible, yet they have real impact. They often arise in grey areas where rules and ethics intersect. The danger is that organizations focus on well-known risks, while the true threats play out in everyday practice, informal agreements, unspoken expectations, and well-intentioned but poorly considered decisions.  

The good news? By consciously addressing these underestimated risks, and by fostering a culture in which employees feel safe to ask questions, many problems can be prevented. Open dialogue, regular risk assessments, and clear agreements regarding ancillary activities, decision-making, and communication are essential. Integrity is not a matter of luck, but of awareness and action. The earlier risks are recognized, the better they can be managed before they escalate. 

Growing Attention to Integrity 

Recent reports and governance codes encountered in our work show that integrity is increasingly linked to concrete standards, assessments, and practical guidance. Examples include: 

  • Tightened codes of conduct for board members and supervisory board members, with emphasis on transparent disclosure of secondary positions and interests; 
  • Local and sector-specific codes of conduct (for example in municipalities, education, and housing corporations) that explicitly define how to deal with gifts, ancillary activities, and decision-making in situations of doubt; 
  • Clear guidelines for safe reporting procedures (whistleblowing) and independent handling, ensuring that reporters feel protected and that investigations are conducted independently of operational management. 

Integrity investigations directly support these frameworks: they are the instruments used to assess whether these standards are genuinely upheld in practice. 

Invitation to Consultation 

We can imagine that, after reading this article, you may have questions or wish to exchange views on certain topics. Or perhaps you are dealing with a concrete case and would like to discuss it. We invite you to contact us without obligation for an introductory conversation about you and/or your case. Our contact details can be found at the end of this article or on our website.  

Looking Ahead to the Fourth Article 

The risks discussed, ranging from loyalty conflicts to group pressure, often remain hidden until someone has the courage to report them. In the fourth article of our series, we therefore take a deeper dive into whistleblowing investigations: how should organizations handle internal (or external) reports? How can employees be encouraged to speak up? And how can a report and the investigation results be translated into genuine, lasting change? 

Get in touch

Dennis van der Meer | +31618948848 | dennis.van.der.meer@compliancechamps.com

Boy Custers | +31649935735 | boy.custers@compliancechamps.com

 

Read more articles here.

Combatting Fragmentation and Stimulating Harmonisation Through EU Supervision of Crypto-Asset Services

Crypto-asset activities have expanded rapidly across the European Union (EU). This growth has increased the risk of money laundering and terrorist financing (ML/TF), especially in situations where regulatory oversight was fragmented or incomplete. The European Banking Authority (EBA) published a report in the fall of this year which explains how certain crypto-asset businesses created vulnerabilities and how the Markets in Crypto-Assets Regulation (MiCA) and AML frameworks (AMLR and AMLD6) aim to improve supervision. This article provides a brief insight in the key takeaways from this report.

Supervisors observed that some crypto businesses operated without approval, moved between EU countries to avoid oversight, or misused legal exemptions. Many had weak systems for checking customers, detecting suspicious transactions, or following sanctions. Some firms used complicated ownership structures or partner companies to stay active despite earlier supervisory issues. These behaviours limited authorities’ ability to manage risks and created openings for money laundering and terrorist financing.

MiCA and the new EU anti-money-laundering regulations introduce stronger safeguards to address these problems. All crypto-asses service providers (CASPs) must now apply for one EU authorisation based on harmonised rules, which removes differences between Member States and prevents firms from seeking out weaker jurisdictions. Providers must show clear ownership, sound internal governance, and reliable customer- and transaction-monitoring systems before they can operate. The AML Regulation and AMLD6 further strengthen cooperation between national supervisors, improve transparency on who controls a company, and require more consistent risk assessments. The future EU Anti-Money Laundering Authority (AMLA) will also oversee high-risk firms directly, creating an additional layer of control.

These changes help create a safer and more predictable environment for crypto activities in the EU. The main lesson from recent cases is that strong, coordinated supervision and consistent rules across all Member States are necessary to limit financial crime risks. Clear standards, early information-sharing, and firm enforcement give supervisors the tools to identify problems quickly and ensure that only responsible businesses can enter or remain in the European market. The EBA formulates nine points of focus that should be established to treat authorisation as a true gatekeeping process, to close loopholes and build strong cooperation mechanisms across the EU.

Although the role of the EBA will partially transfer to AMLA by the end of 2025, the EBA will continue contributing under its MiCA mandate to maintain supervisory convergence and early risk detection.

 

Conclusion

At Compliance Champs, we follow these developments with a critical lens. We support organizations in aligning their processes and controls with MiCAR, the Wwft, and international standards. Through knowledge sharing, training, and tailored advice, we help professionals identify risks in time, implement mitigating measures, and embed sustainable compliance. Only through joint efforts by operators, supervisors, financial institutions, and technology partners can the balance between innovation and integrity truly be restored.

 

Do you seek support and assistance in enhancing your Crypto Compliance Framework?

Please reach out to us on: info@compliancechamps.com

Read more articles here.