Retour à The LedgerConformité

What is negative news screening? A practical definition for Swiss compliance teams

What negative news screening actually is, why Swiss banks do it, when it happens, and what regulators expect to see in the documentation. The 101 explainer for compliance officers landing cold.

Antoine Bedaton
Antoine Bedaton
12 nov. 202510 min de lecture
What is negative news screening? A practical definition for Swiss compliance teams

Part of our complete guide to negative news screening for Swiss banks. This post is the deep dive on what negative news screening actually is; the guide covers the end-to-end picture.

If you have just been told your bank needs to "do better at negative news screening", and you arrived at this page from a search engine without a strong prior on what that phrase means under Swiss law, this is the explainer. It is aimed at compliance officers new to the topic, procurement teams comparing vendors, and risk officers who want to know why their auditors keep asking about it.

The plain definition

Negative news screening (NNS, also called adverse media screening) is the structured search of publicly available information for derogatory or risk-relevant facts about a counterparty. The counterparty is usually a client or a beneficial owner; the facts are usually allegations or findings of money laundering, fraud, sanctions evasion, corruption, terrorist financing, or related predicate offences. The output is documented evidence that informs a money-laundering risk assessment under Swiss AML rules.

A concrete example. A Zurich-based cantonal bank is onboarding a Swiss SME importing electronics from outside the EU. Identification under CDB 20 is straightforward (commercial register extract, beneficial-owner declaration). Sanctions screening returns no hits. PEP screening returns no hits. The compliance analyst then runs an NNS pass on the SME, its director, and its UBO: news search, court records, regulatory press releases, structured-data sources. They find a 2022 article in a local German-language paper alleging that the director was investigated for VAT fraud (case later dropped). That single article is the kind of finding NNS exists to surface, and the kind of finding that has to be captured, assessed, and documented to a standard an auditor can read in 2030.

That is the function. The substance of the obligation, and what good NNS looks like operationally, is the rest of this post.

Why Swiss banks do it: the regulatory drivers

There is no Swiss statute or circular titled "Negative News Screening". Like much of the AML obligation set, it is implicit in a combination of statute, ordinance, and circular. Four texts do the heavy lifting.

AMLA Art. 6: the clarification duty

Article 6 of the Anti-Money Laundering Act (AMLA / GwG, SR 955.0) requires financial intermediaries to clarify the economic background and purpose of a transaction or business relationship if it appears unusual, or if there are indications that assets stem from a crime, or if the counterparty is on a sanctions list, or if the relationship is otherwise high-risk. The clarification has to be "appropriate to the circumstances".

NNS is one of the core tools institutions use to satisfy this clarification duty. The article does not say "do an adverse media search" in those words, but the clarification you owe under Art. 6 is substantively impossible to discharge without one. If a counterparty has been publicly named in a corruption investigation and the institution did not look, the gap is hard to defend.

AMLA Art. 7: record-keeping (the 10-year floor)

Article 7 requires financial intermediaries to keep documents so they can fulfil their AMLA duties, and explicitly so they can respond within reasonable time to requests from prosecution authorities. The retention period is ten years from termination of the business relationship or completion of the transaction (Art. 7 para. 3).

The 2023 AMLA revision (in force 1 January 2023) added Art. 7 para. 1bis, which requires that records be periodically reviewed and updated, with the periodicity and scope set on a risk basis. That revision is what made periodic re-screening of the existing book explicitly an obligation, not just an industry norm.

For NNS evidence specifically, Art. 7 sets the floor: ten years, in a usable form, including the search results and the analyst's reasoning.

AMLO-FINMA Art. 22: the reconstruction obligation

Article 22 of AMLO-FINMA (SR 955.033.0) goes further. It requires that documents and supporting evidence be prepared so that individual transactions can be reconstructed, and that the documentation be understandable to a knowledgeable third party. The ordinance is specific about who that third party is: FINMA itself, FINMA-engaged auditors (FINMASA Art. 25), FINMA-appointed investigators (FINMASA Art. 36), and audit firms approved by the audit oversight authority.

Most institutions read Art. 22 as a record-keeping obligation. It is not. Record-keeping says "store the data". Reconstruction says "prove a third party can use it". For NNS, that means the captured news article has to render in 2030 the way it rendered in 2025; the analyst's reasoning has to be readable by someone who has never met the analyst; the reviewer's authority has to be reconstructable as it stood at the time of the decision, not as it stands today. Our longer breakdown of Swiss AML evidence rules unpacks this in detail.

FINMA Circular 2023/1 Ch. IV.D: critical data risk management

FINMA Circular 2023/1 on operational risks and resilience for banks (in force from 1 January 2024) is not an AML circular, but its Chapter IV, Letter D on Critical Data Risk Management has direct operational implications for NNS infrastructure. The circular extends the previous focus on confidentiality of client identifying data to all three of confidentiality, integrity, and availability. NNS evidence is critical data by any reasonable interpretation of the test, which means tamper-evidence and reconstructability are operational-resilience asks now, not just AML asks.

In practice the four texts are read together. AMLA Art. 6 makes the search obligatory; AMLA Art. 7 sets the retention floor; AMLO-FINMA Art. 22 sets the reconstruction bar; Circular 2023/1 Ch. IV.D sets the integrity-and-availability expectation around the same evidence.

What is in scope, and what isn't

A common cause of confusion in early NNS conversations is distinguishing it from neighbouring obligations. A short orientation.

  • Sanctions screening matches a counterparty against official consolidated lists (UN, EU, OFAC, SECO). Different sources, binary output, different legal basis (Embargo Act, FATF R.6 / R.7).
  • PEP screening identifies whether the counterparty (or a connected party) is a politically exposed person. Shares infrastructure with NNS, but the source data is structured PEP registries, and the legal trigger is different.
  • Negative news screening searches unstructured public information (news, court filings, regulatory press releases, blogs) for risk-relevant facts not on any sanctions list. The output is rarely binary. Most NNS hits require human assessment.

In a typical onboarding flow these three pieces share a UI but generate distinct evidence. We have a longer post on how OpenSanctions and World-Check compare on the sanctions and PEP side; we will cover NNS-specific source selection in a follow-up.

A quick anti-pattern: institutions that "outsource NNS to their sanctions list provider" by checking a tickbox. The list provider gives you a sanctions/PEP feed, and possibly a curated adverse media overlay, but adverse media coverage is necessarily incomplete. A five-paragraph article in a regional Swiss paper alleging fraud against a Swiss SME director is unlikely to enter any commercial adverse media database for weeks, if at all. NNS is not solved by a single subscription.

When NNS happens

Three distinct triggers, each with its own cadence and evidence expectation.

Onboarding

The original NNS pass runs at account opening, before the business relationship is established. The CDB 20 identification process and the AMLA Art. 6 clarification duty land here. For low-risk relationships the pass can be light; for high-risk relationships the pass is part of enhanced due diligence and tends to involve multiple sources, multiple languages, and four-eyes review. Our architecture note on the four-eyes principle covers the review side.

Periodic re-screening

AMLA Art. 7 para. 1bis (added in 2023) makes periodic review explicit: records must be periodically checked and updated on a risk basis. The practical interpretation is that high-risk relationships get re-screened more often than low-risk ones, the cadence is documented, and the cadence is followed. Annual is common for high-risk; longer intervals are common for low-risk. The cadence is itself part of the record, because an examiner will eventually ask "what is your periodicity, and where is the evidence you stuck to it?".

Event-driven re-screening

A change in the relationship triggers a re-screen. New beneficial owner, new transaction pattern, new jurisdiction of operation, new public allegation surfaced through monitoring. AMLO-FINMA's general expectation is continuous review of risk during the relationship, not only at fixed checkpoints. Event-driven NNS is what closes the gap between two scheduled periodic reviews.

For the vendor due diligence exercise on candidate NNS systems, the question to ask is whether the system supports all three triggers as first-class workflows, or whether one of them (typically the event-driven one) is bolted on.

What "good" looks like: evidentiary standards

Once you have decided NNS is in scope and you have a workflow that fires on the right triggers, the open question is what the evidence actually looks like, and whether it survives the audit it will be asked to.

Five properties that hold up.

The captured evidence is what the analyst saw at the moment of review. URLs rot. Paywalls change. CDNs move assets. A link in a 2025 investigation file that points to a third-party news site is overwhelmingly likely to be broken or changed by 2030. The article itself, captured as HTML or PDF and stored in your evidence layer, is what survives.

Structured reasoning, not free text

The analyst's interpretation of a hit is the load-bearing artifact in the audit chain. "False positive, name collision" is a defensible disposition if it is captured as a structured reason code with the matched entity name and the disambiguating fact. The same idea written as freeform "not the same person" in a notes field is much harder to defend five years later, especially if the analyst has left the firm. Structure where you can; supplement with free text where you cannot.

Reviewer identity frozen at write-time

"Reviewer: Maria Schmidt, then VP Compliance, employee 4413, delegated authority X, supervised by Y" reconstructs cleanly. A bare user-id 4413 resolved against the current directory does not, if Maria has since changed roles, left, or had her authority revoked. This is the property our four-eyes architecture post calls "identity at write-time".

Tamper-evident over the underlying evidence

Storage immutability alone is not sufficient. The institution should be able to prove, without trusting any single component, that the evidence shown today is what was captured then. SHA-256 chains anchored externally are one approach; we describe the design in our evidence-chain post. Under Circular 2023/1 Ch. IV.D, integrity is no longer optional for critical data.

Reconstructable end-to-end

The combination of the four properties above produces the property that matters most: a third party who has never seen the case can pick up the file in 2030 and write a defensible timeline of why the decision was made. That property is what AMLO-FINMA Art. 22 actually asks for, and the cheapest way to verify it is to run an audit drill against your own system before someone else does.

The two tests, said differently

Record-keeping says "store the NNS evidence". Reconstruction says "prove a third party can use it". Most NNS deployments pass the first test and quietly fail the second. The systems that show up in enforcement files tend to be the ones where item 1 was the only test that ever ran.

Bottom line

Negative news screening is a structured public-information search done at onboarding, periodically, and on events; it informs the clarification duty under AMLA Art. 6; it has to be retained for ten years under AMLA Art. 7; the documentation has to clear the reconstruction bar in AMLO-FINMA Art. 22; and the underlying evidence has to clear the integrity expectations of FINMA Circular 2023/1 Ch. IV.D. None of those four texts uses the words "negative news screening", and none of them stands alone. Read together they define the obligation operationally.

If you are sizing the gap between your current setup and that obligation, the most useful single exercise is a five-year drill on a randomly-selected NNS-bearing investigation: who can write a defensible timeline of the decision, in 30 minutes, from a clean read of the file? The answer to that question tells you more than any vendor demo.

We will follow this post with a closer look at NNS versus sanctions versus PEP screening and a practical guide to choosing NNS sources for a Swiss book. If your team is mid-procurement or mid-audit on this and wants to compare notes, we are easy to reach.

#screening#AMLA#FINMA#swiss#intro