Advanced Screening Configuration: Risk, Data Source & Jurisdiction Filtering

Last updated: April 7, 2026

Overview

We are introducing a comprehensive Risk Framework that fundamentally changes how you configure screening. This update moves beyond broad categories, giving you granular control over three distinct layers of screening logic: Risk Type, Data Source, and Jurisdiction.

This extensible framework allows you to pinpoint exact risk exposure, such as distinguishing between "Direct" and "Indirect" sanctions or specific Money Laundering predicate offenses.

Extensibility: This framework is designed to grow. As we extend our database to include new risk types or jurisdictions, they will automatically become available in your screening configurations for selection. 

1. Risk Type Filtering 

You can now define the specific nature of the risk you care about. Instead of generic checks, you can drill down into 8 Top-Level Risks, each with granular sub-risks:

  • Sanctions Exposure

  • Political Exposure (PEPs)

  • Terrorist Financing

  • Proliferation Financing

  • Money Laundering

  • Regulatory & Reputational

  • Fraud

  • Internal Risk

Each top level risk can have sub-risks allowing for more granular risk type selection. For example Money Laundering contains each of the predicate offences as defined by 

2. Data Source Type Filtering

Once you have selected your Risk Types, you can specify where that data comes from. You can now toggle the following 4 Data Source Types:

  1. Sanctions Lists: Official government and international body sanction lists (e.g., OFAC, UN).

  2. Watchlists: Regulatory and law enforcement watchlists (e.g., Most Wanted lists, Disqualified Directors).

  3. Media: Adverse media articles and negative news coverage.

  4. PEP Lists: Databases of Politically Exposed Persons, their families, and close associates.

Granular Control: Unselect specific source types that do not match your risk appetite.

Example: You might enable Money Laundering Risk but exclude Watchlists if you only want results from Media.

3. Jurisdiction (Region-Based) Filtering

Finally, once you have combined your Risk Types and Data Source Types, you can outline the specific jurisdictions (regions) from which you wish to receive this combination.

  • Refined Scope: This allows you to say, "I only want to see Sanctions Lists (Source) for Sanctions Exposure (Risk) if they originate from the US, Canada, or International bodies."

  • Default Behavior: By default, All Jurisdictions are included. You must explicitly select specific countries to narrow the scope.

  • Union Logic: If the user selects a specific issuing jurisiction the system will also include the unique attributes of the customer (address, nationality etc) to the search ensuring the screen also includes the unique risk associated with the customer. The search returns results if the origin matches The Customer’s Country OR The Configuration List.

4. Match Threshold

Define the minimum score required for a result to appear.

  • The Score: Our search engine calculates a match score (0-99) based on inputs like names, dates of birth, countries, and proprietary machine learning logic.

  • The Filter: The system will only return hits where the calculated Match Score is greater than the threshold you set.

    • High Threshold (e.g., 90+): Fewer results, higher confidence (Near Exact matches).

    • Low Threshold (e.g., 70+): More results, broader search (Fuzzier matches).

Key Feature: Smart Validation (Valid Combinations Only)

A critical component of this new framework is Dynamic Validation. The system ensures that you can only configure valid combinations of Risk Types, Data Sources, and Jurisdictions.

  • How it works: The interface will strictly limit your options based on the data available in our system.

  • Example: If you select "Sanctions Risk", the system will not present a "Media" data source option because that specific combination does not exist in our dataset.

  • Benefit: This prevents "dead" configurations, ensuring that every filter you set is capable of returning actual results.