Home » News » Best Practices for Combating the Abuse of NPOs (FATF Recommendation 8)
Best Practices for Combating the Abuse of NPOs (FATF Recommendation 8)
PUBLISHED: JUNE 2015
The Financial Action Task Force (FATF) Best Practices Paper on Combating the Abuse of Non-Profit Organizations was first written in 2002 at a time when the FATF had just introduced standards to address specific terrorist financing vulnerabilities and threats in the wake of the September 11, 2001, terrorist attacks.
This June 2015 update incorporates lessons learned since then, and is designed to:
Assist countries in their implementation of Recommendation 8 on non-profit organizations, in line with Recommendation 1 and the risk-based approach, and consistent with countries’ obligations to respect freedom of association, assembly, expression, religion or belief, and international humanitarian law;
Assist NPOs which fall within the scope of the FATF definition of a non-profit organization to help meet the objectives of Recommendation 8 and mitigate TF threats they may face; and
Assist financial institutions in the proper implementation of a risk-based approach when providing financial services to NPOs, and guide donors who are providing funding to NPOs.
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.