Loading...
 

Pythia - Anti-Terror Screening

Pythia Sanctions List Check

Protect yourself and your business from embargo violations. Automatically check all your contacts against EU, US and other countries' sanctions lists.

With Pythia, the sanctions lists published by the UN or the EU can be transferred to the Pythia database and kept up-to-date. This data is ready to be matched with MS Outlook contacts or the customer or supplier data of other host or ERP databases per individual search or as a whole (mass matching).

If matches are found, they are logged, stored in a list of all hits and, after manual checking, transferred to a blacklist or whitelist. Persons, companies or one-time addresses that are transferred to a blacklist can be automatically blocked in the host system for any business use.

Each logged match must be processed at the end so that all hits are listed either in the blacklist or whitelist.

If a matching person/company/one-time address from the host database is found in the Pythia database for a person/company/one-time address, this hit is stored in the system in addition to the partner data involved: each person or company in the Pythia database contains a list of matches in the host database, for each person, company one-time address from the host database, the persons or companies named in a sanctions list can be called up.

To obtain an initial overview, you can carry out a mass comparison without a log.

Sanctions lists

The most recent version of the published EU and UN sanctions lists is transferred to the Pythia Anti-Terror Database. Each import is logged according to the extent of the changes (new, omitted, modified).

All blocked companies and/or persons transferred from the sanctions lists to the Pythia database can either be listed according to specific search criteria or specific companies and/or persons can be searched for.

Comparison

MS Outlook contacts or the personal and company data of the host or ERP system are automatically matched with the data of the Pythia anti-terror database. Every hit is reported and can be logged.

Blacklists and whitelists are used to ensure proper and efficient screening of suspicious persons and companies.

Protocols

All automatically generated protocols for searches, matching or importing are securely stored in the Pythia database and can be viewed at any time. You thus achieve a very high level of legal security.

Operational business