Regulatory Technology (RegTech): Complete Table of Contents

Compliance Automation, Algorithmic Auditing, Computational Law


Front Matter

  • Title Page
  • Preface: Why RegTech Matters Now
  • Acknowledgments
  • How to Use This Book
  • Prerequisites

Part 1: Foundations of RegTech (Chapters 1–5)

Establishing the conceptual, historical, and technological ground upon which all RegTech rests.

Chapter 1: What Is RegTech? History, Definitions, and the Compliance Crisis

  • 1.1 The Compliance Burden: Why Regulation Became Unmanageable
  • 1.2 Defining RegTech: A Taxonomy of Definitions
  • 1.3 A Brief History: From Manual Compliance to Machine Learning
  • 1.4 The 2008 Financial Crisis as RegTech Catalyst
  • 1.5 The Five Families of RegTech: A Functional Framework
  • 1.6 RegTech vs. FinTech vs. LegalTech: Overlaps and Distinctions
  • 1.7 Meet the Characters: Maya, Rafael, Priya, and Cornerstone
  • 1.8 Chapter Summary

Chapter 2: The Regulatory Landscape: Financial Regulation and Its Architecture

  • 2.1 Why Financial Markets Are Regulated: Market Failure Theory
  • 2.2 The Principal Regulators: US, EU, UK, and APAC Architecture
  • 2.3 Types of Financial Regulation: Prudential, Conduct, and Market Integrity
  • 2.4 The Regulatory Cycle: Rule-Making, Supervision, and Enforcement
  • 2.5 How Regulations Become Requirements: A Process Map
  • 2.6 The Extraterritorial Problem: When Regulation Crosses Borders
  • 2.7 Regulatory Complexity as Business Risk

Chapter 3: The RegTech Ecosystem: Players, Platforms, and Market Dynamics

  • 3.1 The RegTech Market: Size, Growth, and Segmentation
  • 3.2 Pure-Play RegTech Vendors vs. Integrated Platforms
  • 3.3 Big Tech and the RegTech Stack
  • 3.4 Financial Institutions as RegTech Builders vs. Buyers
  • 3.5 Regulatory Bodies as Technology Consumers: SupTech
  • 3.6 Investment Dynamics: VC, Corporate Venture, and M&A
  • 3.7 The Consolidation Wave: What It Means for Buyers

Chapter 4: Technology Foundations: AI, ML, NLP, and Automation in Compliance

  • 4.1 Mapping Technology to Compliance Problems
  • 4.2 Rule-Based Systems: Determinism and Its Limits
  • 4.3 Machine Learning Fundamentals for Compliance Professionals
  • 4.4 Natural Language Processing: Reading Regulation at Scale
  • 4.5 Robotic Process Automation in Compliance Workflows
  • 4.6 Graph Analytics: Network Effects in Financial Crime
  • 4.7 The AI Readiness Assessment for Compliance Teams

Chapter 5: Data Architecture for Regulatory Compliance

  • 5.1 Why Data Is the Foundation of Every RegTech Solution
  • 5.2 Data Governance Frameworks for Compliance
  • 5.3 The Regulatory Data Taxonomy
  • 5.4 Data Quality: The Silent Failure Mode
  • 5.5 Data Lineage and Audit Trails
  • 5.6 Master Data Management in Financial Institutions
  • 5.7 Cloud vs. On-Premise vs. Hybrid: Architectural Choices

Part 2: Identity, KYC, and AML (Chapters 6–11)

The most resource-intensive domain in compliance — and the one most transformed by technology.

Chapter 6: KYC Fundamentals: Identity Verification at Scale

  • 6.1 The KYC Obligation: Origins and Evolution
  • 6.2 Customer Identification Program (CIP) Requirements
  • 6.3 Document Verification: From Manual to Automated
  • 6.4 Biometric Verification: Liveness Detection and Deepfake Risk
  • 6.5 Electronic Identity Verification (eIDV): APIs and Data Sources
  • 6.6 KYC Orchestration Platforms: The Architecture of Automation
  • 6.7 Ongoing Monitoring: Keeping KYC Current

Chapter 7: AML Transaction Monitoring: Rules-Based vs. AI-Driven Approaches

  • 7.1 The AML Framework: From FATF to Local Implementation
  • 7.2 Transaction Monitoring: How It Works
  • 7.3 Rules-Based Systems: Tuning, Thresholds, and Typologies
  • 7.4 Machine Learning in Transaction Monitoring: What Changes
  • 7.5 Managing Alert Volume: The False Positive Problem
  • 7.6 Hybrid Approaches: Rules + AI in Production
  • 7.7 Alert Review Workflows and Productivity Metrics

Chapter 8: Sanctions Screening: Watchlists, False Positives, and Calibration

  • 8.1 Sanctions Regimes: OFAC, EU, UN, and the UK's Regime
  • 8.2 The Screening Obligation: Who, When, and What
  • 8.3 Fuzzy Matching: Algorithms and Their Trade-offs
  • 8.4 Calibrating for False Positives: The Compliance-Operations Tension
  • 8.5 List Management and Change Control
  • 8.6 Real-Time vs. Batch Screening: Architectural Considerations
  • 8.7 Sanctions Violations: Enforcement Cases as Learning Opportunities

Chapter 9: Beneficial Ownership and Corporate Transparency

  • 9.1 The Beneficial Ownership Problem: Why Shells Matter
  • 9.2 The Corporate Transparency Act (CTA) and EU 6AMLD
  • 9.3 UBO Registries: Data Quality and Accessibility
  • 9.4 Technology Solutions for UBO Discovery
  • 9.5 Graph-Based UBO Analysis: Finding Hidden Controllers
  • 9.6 Cross-Border Complexity: Jurisdictional Mismatches
  • 9.7 Implementation Obligations for Financial Institutions

Chapter 10: Customer Risk Rating and Enhanced Due Diligence

  • 10.1 The Risk-Based Approach: The Foundation of Modern AML
  • 10.2 Customer Risk Scoring: Factors and Models
  • 10.3 Enhanced Due Diligence (EDD): Triggers and Procedures
  • 10.4 PEP Screening: Politically Exposed Persons and Their Networks
  • 10.5 Adverse Media Screening: NLP at Scale
  • 10.6 Dynamic Risk Rating: Moving from Static to Continuous
  • 10.7 Documenting Risk Decisions: What Regulators Want to See

Chapter 11: Suspicious Activity Reporting and Case Management

  • 11.1 The SAR Obligation: Legal Requirements and Protections
  • 11.2 The Anatomy of a SAR: Structure and Quality Standards
  • 11.3 Case Management Systems: From Alerts to Reports
  • 11.4 AI-Assisted Narrative Writing for SARs
  • 11.5 Metrics and Quality Assurance for SAR Programs
  • 11.6 Law Enforcement Feedback: Closing the Loop
  • 11.7 Tipping-Off Prohibitions and the Consent Regime

Part 3: Risk Management and Regulatory Reporting (Chapters 12–17)

How financial institutions measure, model, and report the risks regulators care about most.

Chapter 12: Operational Risk and Technology Risk Management

  • 12.1 Defining Operational Risk: Basel's Framework
  • 12.2 The Technology Risk Subset: Cyber, Model, and Vendor Risk
  • 12.3 Risk Event Data Collection and Loss Databases
  • 12.4 Scenario Analysis for Operational Risk
  • 12.5 Key Risk Indicators (KRIs) and Early Warning Systems
  • 12.6 Third-Party and Vendor Risk Management
  • 12.7 Resilience: Recovery Time Objectives in Regulatory Context

Chapter 13: Regulatory Reporting: From XBRL to API-Based Reporting

  • 13.1 The Regulatory Reporting Ecosystem: What Gets Reported
  • 13.2 XBRL: The Language of Machine-Readable Reporting
  • 13.3 Common Reporting Standard (CRS) and FATCA
  • 13.4 MiFIR Transaction Reporting: Fields, Logic, and Exceptions
  • 13.5 API-Based Reporting: The Future Architecture
  • 13.6 Building a Regulatory Reporting Pipeline in Python
  • 13.7 Data Quality Controls and Reconciliation

Chapter 14: Market Risk and the Basel Framework in Practice

  • 14.1 Market Risk Fundamentals: VaR, ES, and Beyond
  • 14.2 Basel III/IV: The Regulatory Capital Framework
  • 14.3 The Fundamental Review of the Trading Book (FRTB)
  • 14.4 Internal Model Approval: The Model Risk Implications
  • 14.5 Liquidity Risk: LCR, NSFR, and Intraday Monitoring
  • 14.6 Interest Rate Risk in the Banking Book (IRRBB)
  • 14.7 Stress Testing Market Risk Exposures

Chapter 15: Credit Risk Modelling and Model Risk Management

  • 15.1 Credit Risk Basics: PD, LGD, EAD
  • 15.2 Internal Ratings-Based (IRB) Approach: Requirements
  • 15.3 Building a Credit Risk Model: Process and Pitfalls
  • 15.4 SR 11-7: The US Model Risk Management Framework
  • 15.5 Model Validation: Independence, Testing, and Documentation
  • 15.6 IFRS 9 and ECL Modelling: The Accounting-Prudential Link
  • 15.7 Machine Learning in Credit Risk: Opportunities and Regulatory Friction

Chapter 16: Stress Testing and Scenario Analysis

  • 16.1 Why Stress Testing? From SCAP to DFAST to EBA
  • 16.2 Regulatory Stress Test Frameworks: A Comparative Review
  • 16.3 Designing Stress Scenarios: Adverse, Severely Adverse
  • 16.4 Running a Stress Test: Data, Models, and Aggregation
  • 16.5 Sensitivity Analysis vs. Scenario Analysis
  • 16.6 Communicating Stress Test Results to Boards and Regulators
  • 16.7 Climate Stress Testing: The Emerging Requirement

Chapter 17: Data Privacy, GDPR, and Cross-Border Data Compliance

  • 17.1 The Privacy-Compliance Tension: A Structural Conflict
  • 17.2 GDPR Fundamentals for Compliance Professionals
  • 17.3 Data Subject Rights in a Compliance Context
  • 17.4 Cross-Border Data Transfer: SCCs, BCRs, and Adequacy
  • 17.5 Privacy by Design in RegTech Systems
  • 17.6 CCPA and the Patchwork of US Privacy Law
  • 17.7 Navigating Conflicts: When AML Requirements and Privacy Clash

Part 4: Trading Compliance and Market Surveillance (Chapters 18–22)

The high-speed world of securities trading and the technology that monitors it.

Chapter 18: MiFID II, MiFIR, and Best Execution Compliance

  • 18.1 The MiFID II Framework: Scope and Structure
  • 18.2 Best Execution: From Principle to Process
  • 18.3 Best Execution Monitoring: Data Requirements and Systems
  • 18.4 Product Governance and Target Market Assessment
  • 18.5 Research Unbundling: The CSA and Payment Models
  • 18.6 Transaction Reporting under MiFIR: Practical Implementation
  • 18.7 Post-Brexit: UK MiFID and Divergence Tracking

Chapter 19: Market Surveillance: Detecting Manipulation and Abuse

  • 19.1 Market Abuse Regulation (MAR): The Framework
  • 19.2 Insider Dealing: Definition, Detection, and Case Studies
  • 19.3 Market Manipulation Typologies: An Illustrated Guide
  • 19.4 Cross-Asset and Cross-Market Surveillance Challenges
  • 19.5 Surveillance Analytics: From Rules to Machine Learning
  • 19.6 The Supervisory Timeline: From Detection to Referral
  • 19.7 Regulators as Surveillance Partners: STORs and Data Sharing

Chapter 20: Pre-Trade and Post-Trade Transparency Requirements

  • 20.1 Transparency in Markets: The Regulatory Logic
  • 20.2 Pre-Trade Transparency: Quote and Order Display Rules
  • 20.3 Post-Trade Transparency: Trade Reporting Architecture
  • 20.4 Approved Publication Arrangements (APAs) and ARM
  • 20.5 Systematic Internalisers: Obligations and Technology
  • 20.6 Dark Pools and Waivers: Regulatory Boundaries
  • 20.7 Consolidated Tape: The Data Infrastructure Challenge

Chapter 21: Algorithmic Trading Controls and Kill Switches

  • 21.1 Algorithmic Trading in Scope: What Counts
  • 21.2 Pre-Trade Risk Controls: The Regulatory Floor
  • 21.3 Kill Switches: Architecture, Testing, and Governance
  • 21.4 Algorithm Testing and Deployment Controls
  • 21.5 Annual Self-Assessment Requirements
  • 21.6 Market Making Obligations and Withdrawal Rights
  • 21.7 High-Frequency Trading: Additional Obligations

Chapter 22: Trade Surveillance: Spoofing, Layering, and Front-Running Detection

  • 22.1 Manipulative Trading: Legal Definitions and Enforcement History
  • 22.2 Spoofing: Technical Mechanics and Detection Approaches
  • 22.3 Layering: Pattern Recognition at Microsecond Resolution
  • 22.4 Front-Running: Information Barriers and Monitoring
  • 22.5 Cross-Desk Surveillance: The Communications Challenge
  • 22.6 Voice and Electronic Communications Surveillance
  • 22.7 Building a Trade Surveillance Program: A Practical Framework

Part 5: Emerging Technologies in RegTech (Chapters 23–28)

The frontier technologies reshaping what compliance can do.

Chapter 23: NLP for Regulatory Intelligence and Horizon Scanning

  • 23.1 The Regulatory Text Problem: Volume, Complexity, and Change
  • 23.2 NLP Fundamentals for Regulatory Applications
  • 23.3 Building a Regulatory Horizon Scanning System
  • 23.4 Obligation Extraction: From Regulation to Requirement
  • 23.5 Change Impact Analysis: NLP for Gap Assessment
  • 23.6 Semantic Search for Regulatory Research
  • 23.7 Large Language Models in Regulatory Intelligence: Capabilities and Risks

Chapter 24: Blockchain, Smart Contracts, and Immutable Audit Trails

  • 24.1 Blockchain Fundamentals for Compliance Professionals
  • 24.2 Immutability as an Audit Property: What It Delivers and What It Doesn't
  • 24.3 Smart Contracts as Compliance Automation
  • 24.4 DeFi and the Compliance Challenge
  • 24.5 Asset Tokenization and Regulatory Treatment
  • 24.6 Travel Rule Compliance in Crypto: The FATF Requirement
  • 24.7 Central Bank Digital Currencies (CBDCs): Regulatory Implications

Chapter 25: Machine Learning in Fraud Detection

  • 25.1 Fraud Taxonomy: Payments, Account Takeover, Synthetic Identity
  • 25.2 Supervised Learning for Fraud: Labeling, Features, and Evaluation
  • 25.3 Unsupervised and Semi-Supervised Approaches
  • 25.4 Real-Time Scoring: Architecture and Latency Constraints
  • 25.5 Model Drift and Adversarial Adaptation
  • 25.6 Challenger Model Programs in Production
  • 25.7 Federated Learning: Collaborative Fraud Detection Without Data Sharing

Chapter 26: Explainable AI (XAI) and Model Governance

  • 26.1 The Explainability Imperative: Regulatory and Ethical Drivers
  • 26.2 SHAP, LIME, and Feature Importance: A Technical Overview
  • 26.3 Explainability in Credit Decisions: The ECOA and Fair Lending Context
  • 26.4 Building a Model Governance Framework
  • 26.5 Model Inventory and Tiering
  • 26.6 Documentation Standards: From MRM to the AI Act
  • 26.7 The Governance-Innovation Tension: Managing Without Stifling

Chapter 27: Cloud Compliance: Regulatory Requirements for Cloud Adoption

  • 27.1 The Cloud Migration Imperative and Its Regulatory Friction
  • 27.2 Regulatory Requirements for Cloud in Financial Services
  • 27.3 Data Residency, Sovereignty, and Localization Requirements
  • 27.4 Shared Responsibility Model: Compliance Implications
  • 27.5 Exit Strategy and Concentration Risk: Regulatory Expectations
  • 27.6 Multi-Cloud Strategy for Regulatory Resilience
  • 27.7 Audit Rights in Cloud Contracts: What You Need and How to Get It

Chapter 28: RegTech APIs, Open Finance, and Interoperability

  • 28.1 APIs as Compliance Infrastructure
  • 28.2 Open Banking Frameworks: PSD2, CDR, and Beyond
  • 28.3 Financial Data Standards: FDX, FCA, and Interoperability
  • 28.4 API Security in a Compliance Context
  • 28.5 Consent Management and Permissioned Data Sharing
  • 28.6 The Open Finance Vision: Regulatory Drivers
  • 28.7 Building Regulator-Facing APIs: SupTech Integration

Part 6: Governance, Ethics, and Law (Chapters 29–34)

The principles, laws, and frameworks governing how RegTech itself is governed.

Chapter 29: Algorithmic Fairness and Bias in Compliance Systems

  • 29.1 The Bias Problem in Automated Compliance
  • 29.2 Sources of Bias: Data, Model, and Deployment
  • 29.3 Fairness Metrics: An Introduction
  • 29.4 Fair Lending and Disparate Impact in Credit Models
  • 29.5 AML and the Racialized Surveillance Problem
  • 29.6 Auditing Algorithms for Fairness: Tools and Methods
  • 29.7 Building a Fairness Program: Governance and Remediation

Chapter 30: The EU AI Act and Algorithmic Accountability

  • 30.1 The EU AI Act: History, Scope, and Risk-Based Framework
  • 30.2 High-Risk AI Systems in Financial Services
  • 30.3 Conformity Assessments and Technical Documentation
  • 30.4 The General Purpose AI (GPAI) Provisions
  • 30.5 Prohibited AI Practices Relevant to Financial Services
  • 30.6 Compliance Timeline: What Needs to Be Done by When
  • 30.7 Global Convergence: The EU AI Act as a De Facto Standard

Chapter 31: Regulatory Sandboxes: Innovation Meets Oversight

  • 31.1 What Is a Regulatory Sandbox?
  • 31.2 The FCA's Regulatory Sandbox: Design and Track Record
  • 31.3 Sandboxes Around the World: Comparative Analysis
  • 31.4 Applying to a Sandbox: Practical Guidance
  • 31.5 Innovation Offices and No-Action Letters: US Equivalents
  • 31.6 Digital Regulatory Reporting Pilots
  • 31.7 The Sandbox Critic: What They Get Wrong (and Right)

Chapter 32: Global RegTech: US, EU, UK, APAC Comparative Landscape

  • 32.1 Why Jurisdiction Matters: The Compliance Overhead of Fragmentation
  • 32.2 US RegTech Landscape: OCC, CFTC, FinCEN, and SEC
  • 32.3 EU RegTech: From ESAs to the Digital Finance Strategy
  • 32.4 UK RegTech: Post-Brexit Positioning and FCA Leadership
  • 32.5 APAC RegTech: MAS, HKMA, and ASIC
  • 32.6 Emerging Markets: Africa, MENA, and LatAm
  • 32.7 The Global Compliance Function: Managing Multi-Jurisdictional Obligations

Chapter 33: Cybersecurity Regulations: DORA, NIST, and Operational Resilience

  • 33.1 Cybersecurity as a Regulatory Obligation
  • 33.2 DORA: The Digital Operational Resilience Act Explained
  • 33.3 NIST Cybersecurity Framework in Financial Services
  • 33.4 Operational Resilience: The BoE and FCA Approach
  • 33.5 ICT Third-Party Risk Under DORA
  • 33.6 Incident Reporting Obligations: Timelines and Authorities
  • 33.7 Building a Cyber-Compliance Program: Integration, Not Duplication

Chapter 34: Ethics in Automated Decision-Making

  • 34.1 The Ethics of Algorithmic Authority
  • 34.2 Consequentialist and Deontological Frameworks Applied to RegTech
  • 34.3 The Right to Human Review: Regulatory and Ethical Dimensions
  • 34.4 Accountability Gaps in Automated Systems
  • 34.5 The Surveillance Question: Where Monitoring Becomes Oppression
  • 34.6 Designing for Human Dignity in Compliance Systems
  • 34.7 Toward an Ethics Charter for RegTech Practitioners

Part 7: Strategy and Implementation (Chapters 35–39)

Building and running RegTech programs that work in the real world.

Chapter 35: Building a RegTech Program: Strategy, Governance, and Roadmapping

  • 35.1 Starting Points: The Compliance Technology Maturity Model
  • 35.2 Strategic Framework: Aligning RegTech to Business Goals
  • 35.3 Governance Structures for RegTech Programs
  • 35.4 The Target Operating Model for Compliance Technology
  • 35.5 Building vs. Buying: A Decision Framework
  • 35.6 Roadmapping: Sequencing Implementation for Maximum Impact
  • 35.7 Securing Board and Executive Buy-In

Chapter 36: Vendor Selection, Due Diligence, and Implementation Management

  • 36.1 The RegTech Vendor Landscape: Navigating the Noise
  • 36.2 Defining Requirements: Functional, Technical, and Regulatory
  • 36.3 Request for Proposal (RFP) Design for RegTech
  • 36.4 Vendor Due Diligence: Financial, Security, and Regulatory
  • 36.5 Contract Negotiation: RegTech-Specific Clauses
  • 36.6 Implementation Management: Phases, Milestones, and Governance
  • 36.7 Post-Implementation Review: Measuring Success

Chapter 37: Change Management for Compliance Transformation

  • 37.1 Why Change Management Is a Compliance Competency
  • 37.2 The Human Side of Compliance Automation
  • 37.3 Stakeholder Mapping for RegTech Programs
  • 37.4 Communication Strategies for Compliance Change
  • 37.5 Training and Capability Building for Automated Compliance
  • 37.6 Managing Resistance: The Analyst Who Doesn't Trust the Model
  • 37.7 Sustaining Change: Governance and Continuous Improvement

Chapter 38: RegTech ROI: Measuring and Communicating Compliance Efficiency

  • 38.1 The ROI Measurement Problem in Compliance
  • 38.2 Cost Baseline: What Compliance Actually Costs
  • 38.3 Direct ROI: Headcount, False Positives, and Processing Time
  • 38.4 Indirect ROI: Regulatory Capital, Penalty Avoidance, and Reputation
  • 38.5 Building the Business Case: Templates and Methods
  • 38.6 Communicating Value to Boards and CFOs
  • 38.7 Benchmarking: Industry Metrics for Compliance Efficiency

Chapter 39: The Future of RegTech: SupTech, Digital Regulation, and What's Next

  • 39.1 SupTech: Regulators as Technology Adopters
  • 39.2 Machine-Executable Regulation: The Policy-as-Code Vision
  • 39.3 Digital Regulatory Reporting: Direct Feed to Regulators
  • 39.4 AI Governance Frameworks: The Next Wave of Requirement
  • 39.5 Quantum Computing and Post-Quantum Cryptography for Compliance
  • 39.6 The RegTech Talent Market: Skills for the Next Decade
  • 39.7 A Practitioner's View from the Frontier

Part 8: Capstone (Chapter 40 + Projects)

Chapter 40: Integrating the RegTech Stack: A Full Program Review

  • 40.1 The RegTech Stack: Components and Interdependencies
  • 40.2 Common Integration Failure Modes
  • 40.3 Data Flows Across the Compliance Ecosystem
  • 40.4 The Character Synthesis: Where Are Maya, Rafael, and Priya Now?
  • 40.5 Governance and Continuous Improvement
  • 40.6 The Practitioner's Reflection: What We Know Now

Capstone Project 1: Design a KYC/AML RegTech Program for a Fintech Startup

Capstone Project 2: Build a Regulatory Reporting Pipeline

Capstone Project 3: Evaluate and Recommend a RegTech Vendor


Appendices

  • Glossary — 200+ RegTech terms defined
  • Answers to Selected Exercises — Worked solutions and discussion guides
  • Bibliography — Annotated references and primary sources
  • Appendix A: Python RegTech Reference — Function and library guide
  • Appendix B: Regulatory Frameworks Guide — Key frameworks at a glance
  • Appendix C: Key Regulations Primer — GDPR, MiFID II, AML6D, DORA, Basel III/IV, and more
  • Appendix D: Templates and Checklists — Implementation-ready tools
  • Appendix E: Quick Reference Cards — Single-page summaries for key topics
  • Appendix F: FAQ — Common practitioner questions answered