Appendix D: Templates and Checklists

Practical Tools for RegTech Compliance Professionals

Ready-to-use templates and checklists for common RegTech compliance activities. Each tool can be adapted to specific institutional contexts. These are starting points — not substitutes for institutional judgment or legal advice.


Template 1: RegTech Vendor Due Diligence Checklist

Purpose: Structured assessment for any RegTech vendor under consideration for a material compliance function

Use: During RFP process and before final vendor selection decision


Section A: Technical Due Diligence

Item Response Evidence Required
System architecture documented? ☐ Yes ☐ No ☐ Partial Architecture diagram
API documentation available? ☐ Yes ☐ No API specification
Data residency: where is data processed? Written confirmation
Data residency: where is data stored? Written confirmation
SOC 2 Type II certified? (or equivalent) ☐ Yes ☐ No Certificate (< 12 months old)
ISO 27001 certified? ☐ Yes ☐ No Certificate
Last penetration test date? Test executive summary
Critical vulnerabilities unresolved? ☐ Yes ☐ No Vulnerability report
Sub-processors used? ☐ Yes ☐ No Sub-processor list
GDPR/UK GDPR compliant? ☐ Yes ☐ No DPA template; privacy policy
DORA Article 30 provisions included in contract? ☐ Yes ☐ No ☐ N/A (non-EU) Contract review
Data export capability (formats, timeline)? Written specification
Business continuity plan (BCP) documented? ☐ Yes ☐ No BCP executive summary
Disaster recovery plan (DRP) documented? ☐ Yes ☐ No DRP executive summary
BCP/DRP last tested? Test report date

Section B: Regulatory Due Diligence

Item Response Notes
Vendor subject to any regulatory enforcement actions (past 3 years)? ☐ Yes ☐ No Describe if Yes
Vendor's clients subject to regulatory findings related to this product? ☐ Yes ☐ No Describe if Yes
Does the system output meet current regulatory format requirements? ☐ Yes ☐ No Specify requirements checked
Has the product been reviewed by any regulator? ☐ Yes ☐ No Describe if Yes
How does the vendor manage regulatory changes (e.g., new SAR format, XBRL updates)? Written process
Who bears the cost of regulatory change updates? ☐ Vendor ☐ Client ☐ Shared Contract clause reference
Does the product support audit trail requirements for your jurisdiction? ☐ Yes ☐ No Specify requirements

Section C: Financial Due Diligence

Item Response Notes
Years in operation?
Number of clients?
Revenue (approximate, if available)?
Funding history (investment rounds, investors)?
Revenue concentration: largest client as % of revenue?
Profitable? ☐ Yes ☐ No ☐ Unknown
Any recent acquisition attempts or M&A activity? ☐ Yes ☐ No
Vendor concentration risk assessment? (Do other regulated clients use this vendor?)

Section D: Reference Assessment

Item Response Notes
Three references provided at similar-scale institutions? ☐ Yes ☐ No
Reference 1 contacted? Outcome?
Reference 2 contacted? Outcome?
Reference 3 contacted? Outcome?
Key questions for references:
— What didn't work as advertised?
— How does the vendor respond to problems?
— Would you select this vendor again?
— What do you wish you had known before signing?

Assessment Outcome: ☐ Proceed to contract ☐ Conditional proceed ☐ Further diligence required ☐ Do not proceed

Signed: __ Date: __


Template 2: Model Risk Governance — Model Inventory Record

Purpose: Document each analytical model in the compliance program for SR 11-7 / EU AI Act governance

One record per model


Model Name: ___________

Model ID: ___ Version: __ Last Updated: ____

Field Detail
Business purpose What decision or process does this model support?
Model type (e.g., Gradient Boosted Tree; Logistic Regression; Rules Engine; Neural Network)
Owner (business) Name and role
Owner (technical) Name and role
Developed by ☐ Internal ☐ Vendor: _______
Deployment date
Risk tier ☐ Tier 1 (Critical) ☐ Tier 2 (Material) ☐ Tier 3 (Low)
EU AI Act high-risk? ☐ Yes — Annex III category: _______ ☐ No ☐ Under assessment
SR 11-7 model? ☐ Yes ☐ No ☐ N/A (non-US)
Decision type ☐ Fully automated ☐ Human-in-loop ☐ Decision support only

Training Data

Field Detail
Data source(s)
Training period From: _ To: _
Sample size
Known biases / limitations
Data quality issues noted

Performance Metrics

Metric At deployment Current Target Last measured
Primary performance metric (e.g., AUC, Precision)
False positive rate
Population Stability Index (PSI)
Other:

Validation Status

Item Status Date Performed by
Initial validation ☐ Complete ☐ Pending
Most recent periodic validation ☐ Complete ☐ Pending
Next scheduled validation
Validation findings (summary)
Outstanding findings

Regulatory Audit Trail

Field Detail
Documentation location
SHAP / explainability method available? ☐ Yes ☐ No
Adverse action explanation generated? ☐ Yes ☐ No ☐ N/A
Human oversight mechanism

Change Log (most recent 5 changes)

Date Change description Approved by

Template 3: Cyber Incident Notification Decision Matrix

Purpose: Immediate reference tool for compliance professionals assessing notification obligations when a cyber incident is detected

Use: Within the first 4 hours of a confirmed incident


Step 1: Classify the Incident

Question Yes No
Does the incident affect ICT systems? Proceed to Step 2 Non-ICT — different track
Is the incident contained? May reduce severity Increases urgency
Is personal data potentially involved? Triggers GDPR track No GDPR immediate action
Is payment processing affected? Check impact tolerance
Are customer-facing services affected? Check impact tolerance

Step 2: DORA Assessment (EU/Dublin branch operations)

Question Answer Action
Does the firm have EU-regulated operations? ☐ Yes ☐ No If No: skip DORA
Number of users affected?
Affected geographical areas?
Duration of disruption (hours)?
Estimated financial impact?
Major incident? ☐ Yes ☐ No ☐ Unclear If Yes/Unclear: file initial notification within 4h of classification

If DORA Major Incident: - Initial notification: within 4 hours of classification - Intermediate report: within 72 hours of classification - Final report: within 30 days of classification

Step 3: UK Regulatory Assessment

Obligation Trigger Deadline Action
FCA PRIN 11 Material incident "As soon as practicable" ☐ Notify ☐ Not required
PRA notification Material incident "As soon as practicable" ☐ Notify ☐ Not required
Impact tolerance breach Actual or projected breach Document immediately ☐ Document

Step 4: UK GDPR Assessment

Question Answer Action
Personal data involved? ☐ Yes ☐ No ☐ Unknown Unknown = assume Yes
If Yes: awareness time (for 72h clock)
High risk to individuals? ☐ Yes ☐ No If Yes: notify individuals too
ICO notification required? ☐ Yes ☐ No Notify within 72h of awareness

Step 5: US Assessment (if US operations)

Obligation Trigger Deadline Action
SEC cybersecurity Material cybersecurity incident 4 business days ☐ Notify SEC ☐ N/A
FINRA As applicable Per FINRA rules ☐ Notify ☐ N/A
State breach laws Personal data of state residents Varies by state ☐ Assess ☐ N/A

Decision Log (complete for every incident assessed)

Field Detail
Incident detected at
Classified at
CCO notified at
DORA classification decision
UK GDPR awareness time (for ICO clock)
Notifications filed
Next deadline
Completed by

Template 4: SAR Filing Decision Checklist

Purpose: Structured documentation of the decision-making process for a Suspicious Activity Report in the UK

Use: Before escalating a case to the MLRO and before filing a SAR with the NCA


Case Reference: ___ Analyst: __ Date: ____

Step 1: Does Suspicion Exist?

The UK tipping-off prohibition (POCA 2002 s.333A) applies once this form is initiated. Do not discuss this case with the customer.

Question Assessment
What specific activity triggered the alert?
Is there an innocent explanation consistent with the customer's profile? ☐ Yes ☐ No ☐ Uncertain
Have you reviewed the customer's transaction history (minimum 12 months)? ☐ Yes
Have you checked prior alerts and any prior SARs for this customer? ☐ Yes
Is the suspicion based on knowledge, not just a statistical flag? ☐ Yes ☐ Partially

If innocent explanation exists and is plausible: document and close. If suspicion exists or cannot be ruled out: proceed to Step 2.

Step 2: DAML Assessment (Consent SAR)

If the suspicious activity is ongoing and you intend to process a transaction that may constitute money laundering:

Question Answer
Is this a consent SAR? ☐ Yes ☐ No
If Yes: can processing wait 7 days for NCA response? ☐ Yes ☐ No
NCA reference number obtained?

Step 3: SAR Content Preparation

Element Completed
Subject information: full name, DOB, address, ID documents
Relationship history with firm
Suspicious activity: specific transactions (dates, amounts, counterparties)
Reason for suspicion: the specific factors that created suspicion
Customer explanation (if sought and appropriate)
Supporting documents attached

Step 4: MLRO Review and Authorization

Field Detail
Referred to MLRO at
MLRO decision ☐ File SAR ☐ Do not file — reason:
SAR filed with NCA at
NCA reference number
Record retained at

Non-Filing Record (complete if MLRO decides not to file):

If the MLRO decides not to file, document the reasons in detail. This record is evidence of a considered decision, not absence of a decision.

Reasons for non-filing: _________

MLRO signature: ___ Date: _____


Template 5: KYC Periodic Review Record

Purpose: Document a periodic KYC review for an existing customer

Trigger: Standard review cycle; risk upgrade; trigger event (PEP status, adverse media, SARs)


Customer Reference: ___ Review Date: __ Analyst: ____

Review Trigger: ☐ Scheduled (standard cycle) ☐ Risk upgrade ☐ Trigger event: _______

Current Risk Tier: ☐ Low ☐ Standard ☐ High ☐ Very High

Step 1: Identity Verification

Element Status Action Required
ID document current? ☐ Yes ☐ No ☐ Expired
Address confirmed? ☐ Yes ☐ No
Biometric match current? ☐ Yes ☐ No ☐ N/A
Beneficial ownership confirmed? ☐ Yes ☐ No ☐ N/A
Beneficial ownership structure changed? ☐ Yes ☐ No If Yes: re-verify

Step 2: Screening Refresh

Screen Result Action
Sanctions (current lists) ☐ Clear ☐ Match
PEP check ☐ Clear ☐ Match ☐ Already PEP
Adverse media ☐ Clear ☐ Alert
INTERPOL / law enforcement ☐ Clear ☐ Alert

Step 3: Risk Assessment

Factor Current Previous Changed?
Customer type ☐ Yes ☐ No
Business type / industry ☐ Yes ☐ No
Countries of operation ☐ Yes ☐ No
Transaction volumes ☐ Yes ☐ No
Source of funds/wealth ☐ Yes ☐ No
PEP status ☐ Yes ☐ No

Risk Assessment Outcome: ☐ Unchanged ☐ Upgraded ☐ Downgraded New Risk Tier: ☐ Low ☐ Standard ☐ High ☐ Very High

Step 4: Outcome and Actions

Action Required Completed Date
Risk tier updated in system
EDD completed (if High/Very High)
SAR assessment (if suspicious activity noted)
Relationship exited (if unacceptable risk)
Next review date set

Analyst sign-off: ___ Supervisor review: _____


Checklist 6: RegTech Program Initiation Checklist

Purpose: Verify that foundational work is in place before committing to a RegTech program

Use: At the beginning of a program planning exercise


Strategic Clarity

  • [ ] Problem statement defined: what specific compliance gap or risk is being addressed?
  • [ ] Regulatory obligation identified: which specific regulation is driving the need?
  • [ ] Success metrics defined: what does "done" look like, measurably?
  • [ ] Strategic orientation chosen: compliance-driven / risk-driven / business-driven?
  • [ ] Build/buy/borrow decision made for each component?

Governance

  • [ ] Executive sponsor identified and committed?
  • [ ] System owner designated (post go-live)?
  • [ ] Governance structure defined (steering committee, PMO if required)?
  • [ ] Decision authority mapped for key program decisions?
  • [ ] Escalation path for conflicts between CCO/CTO/COO defined?

Data Readiness

  • [ ] Required data sources identified?
  • [ ] Data quality assessed for each required source?
  • [ ] Data access confirmed (can the compliance function access the data it needs)?
  • [ ] Data retention requirements confirmed for the proposed solution?
  • [ ] GDPR/UK GDPR lawful basis confirmed for new data processing?

Stakeholders

  • [ ] All affected stakeholder groups identified?
  • [ ] Primary concerns of each group understood?
  • [ ] Change management plan initiated?
  • [ ] Middle management engaged (not just senior leadership)?

Priya's Five Questions (see Chapter 35)

  • [ ] What regulatory obligation or risk are you solving for first?
  • [ ] Who will own the output of this system day-to-day, and do they know?
  • [ ] What data will this system use, and is it clean, current, and accessible?
  • [ ] How will you measure whether this worked?
  • [ ] What changes to human processes does this technology require, and have you planned for them?

Checklist 7: Go-Live Readiness Assessment

Purpose: Final check before production deployment of a RegTech system


Technical Readiness

  • [ ] All required integrations tested end-to-end?
  • [ ] Performance testing completed (load, stress)?
  • [ ] Security assessment completed?
  • [ ] Rollback plan documented and tested?
  • [ ] Data migration validated (counts, quality, reconciliation)?
  • [ ] Monitoring and alerting for the new system configured?

Process Readiness

  • [ ] All procedure documentation updated (old system references removed)?
  • [ ] New process maps approved by compliance leadership?
  • [ ] Regulatory reporting format validated against current requirements?
  • [ ] Audit trail outputs validated for completeness?

People Readiness

  • [ ] All user training completed?
  • [ ] Competence assessments completed for relevant roles?
  • [ ] Super-users designated and equipped?
  • [ ] Team leads briefed and aligned?
  • [ ] Support escalation path documented and communicated?

Regulatory Readiness

  • [ ] Regulator notification made where required?
  • [ ] Regulatory reporting tested against production system?
  • [ ] Model risk documentation complete (SR 11-7 / EU AI Act)?
  • [ ] Vendor contract completed (including DORA Article 30 provisions where applicable)?

Go/No-Go Decision

  • [ ] All critical items above: ☐ Green ☐ Amber (documented exceptions) ☐ Red (go-live blocked)
  • [ ] Amber items reviewed and accepted by: _______
  • [ ] Go-live authorized by: ___ Date: _____