“more than any single product,
behavox is an operating platform for our data.”

– CTO, London based hedge fund

BEHAVOXCRX

get unlimited access to our
exclusive library of scenario plugins

Pick and choose from our library of plug-and-play behavioral models,
all ready to install and run within minutes.

Insider Dealing

Monitors communications that indicate the buying or selling (or inducement of these actions) of publicly traded securities utilizing material nonpublic information.

MA-ID-1-Insider_dealing

Unlawful Disclosure

Monitors for instances of unlawful disclosure of information by a person who possesses inside information and discloses that information.

MA-UDII-1_Unlawful_Disclosure

Expert Network Management Disclosure

Monitors for situations when insider information is disclosed in communication with expert network representatives. This scenario focuses on instances where management is disclosing information.

MA-EN-Expert_Network_Management_Disclosure

Expert Network Management Actions

Monitors for situations when insider information is disclosed in communication with expert network representatives. This scenario focuses on disclosures related to the management actions.

MA-EN-Expert_Network_Management_Actions

 

Rumours

Scenario to detect sharing of rumours used to influence or mislead another person to believe or act in a certain way. This can be a form of manipulation.

MA-MM14-Rumours

Benchmark Rate Fixing

Monitors for communications that mention or request the manipulation of LIBOR or other interbank offered rates (e.g. EURIBOR, SIBOR, TIBOR) as well as general discussions about the potential manipulation of rates.

MA-Benchmark_rate_fixing

Trade Timing

Monitors for instances where a trade is scheduled for a particular time.

MA-Trade_timing

Collusion

Monitors for instances of collusive behavior between two or more persons with the intent of committing market abuse activity (whether they are successful or not) or creating unfair trading conditions.

MA-MM-Collusion

Wash Trades

Monitors for communications between persons attempting to arrange/perform a wash trade or the discussion of having conducted a wash trade.

MA-MM-4- Wash_Trades & MA-MM-5- Wash_Trades

Sleeving

Looks for the reference to “sleeving”, a term used in some Commodities markets to indicate wash trades.

MA-MM-6-Sleeving

Parking

Monitors for communications where participants are discussing the action of parking trades which is a form of position concealment.

MA-MM-9_Parking

Front Running

Monitors for communications where participants are discussing the intention to front run, the action of front running (trading ahead) of client orders or the concealment of these actions, taking advantage of the knowledge and potential impact on the market of a pending client order.

MA-MM-7_Front_Running

Spoofing

Monitors for communications where participants are discussing the the act of spoofing or layering in the market.
MA-MM-12-Spoofing

Off Market Trade

Monitors for communications where participants are discussing the the act performing a trade outside of the formal market or exchange and agreeing a trade outside bid-offer??

MA-MM-11-Off_market_trade

Discontent Fear

Monitors communications for potential instances of harassment with emphasis on individuals expressing discontent or fear.

COC-H-1_Discontent_Fear

Sexual Remarks

Monitors for communications for potential instances of harassment with emphasis on individuals making unwanted sexual advances or obscene remarks to another individual.

COC-H-2_Sexual_Remarks

Manipulating People

Monitors for communications for potential instances of harassment with emphasis on individuals being manipulative towards others.

COC-H-3_Manipulating_People

Stalking

Monitors for communications for potential instances of harassment with emphasis on individuals making unwanted sexual advances or obscene remarks to another individual.

COC-H-4_Stalking

Inappropriate Gossip

Monitors for communications to detect inappropriate discussions about another person’s personal life or appearance which can impact a person’s feelings, credibility or reputation.

COC-IL-4_Inappropriate_Gossip

Recipient Insults

Monitors for communications to detect insults directed at the recipient of a communication (but not organizations).

COC-IL-1_Recipient_Insults

Third Party Insults

Monitors for communications to detect insults directed at specific people (but not organizations).

COC-IL-2_Third_Party_Insults

Work Complaints

Monitors for communications to detect negative feeling from a person about the company, their team or their work.

COC-IL-3_Work_Complaints

Racism

Monitors for communications to detect use of racist language and profanities.

LNG-IHIC-5_Work_Racism

Sexism

Monitors for communications to detect use of sexist language.

LNG-IHIC-4_Sexism

Sexual Minorities

Monitors for communications to detect inappropriate language associated with sexual minorities.

LNG-IHIC-6_Sexual_Minorities

Reporting To Compliance

Monitors communications to identify where individuals are discussing or threatening to raise an issue to Compliance, HR or other external authorities e.g. Regulators.

COC-RC-1_Internal_Reporting

Reporting To Compliance Internal

Monitors communications to identify where negative comments are targeted at Compliance or when employees are raising issues or conflicts with Compliance to a colleague.

COC-RC-2_Compliance_Internal

Reporting To Compliance External

Monitors communications to identify where negative comments are targeted at Compliance or when employees are raising issues or conflicts with Compliance to external contacts.

COC-RC-3_Compliance_external

Complaints

Monitors communications to identify where external parties are expressing negative comments, dissatisfaction or criticisms about the organization, an employee or the outcome of business activity.

LNG-SC1-1-Complaints

Unauthorised Activities

Monitors communications to identify business interactions that are conducted on a communication channel which has not been authorized e.g. Whatsapp, Facebook, WeChat.

LNG-SC1-3-Unauthorised_Activities

Boasting

Monitors for instances where employees are boasting about their trades, clients, financial institutions and positions.

COC-UPB-1-Boasting

Client Confidentiality

Monitors communications to detect for potential inquiries, receipt, disclosure or other misuse of confidential client information.

COI-CC-1_Client_Confidentiality

Gifts and Entertainment 1

Monitors communications for evidence of gifts being exchanged (given or accepted) to obtain preferential treatment with external parties.

COI-GEH-1_Gifts

Gifts and Entertainment 2

Monitors communications for evidence of entertainment being offered or provided in return for preferential treatment.

COI-GEH-2_Relationships

Gifts and Entertainment 3

Monitors communications for evidence of drinks / dinner / parties being offered or provided in return for preferential treatment.

COI-GEH-3_DrinksParty

Gifts and Entertainment 4

Monitors communications for evidence of travel expenses being offered or given in return for preferential treatment.

COI-GEH-4_Travel

Outside Business Interests

Monitors communications for evidence or indications of outside business activity by an employee.

COI-OBA-1-Outside_business_interest

Personal Account Dealing

Monitors communications for evidence of employees using a personal trading account to transact on their own behalf.

COI-PAD-Personal_Account_Dealing

Bribery

Monitors communications for indications of of employees giving or receiving a bribe to influence another individual.

COI-Bribery-1

Behavox Smark Sample

Scenario generates a random sample of communications for review. This is capped at 1% of the total relevant communication*

Behavox_Smart_Sample

Theft

Monitors communications for potential sensitive / confidential data leakage and unauthorized sharing of data with external contacts who should not have access to the content. The scenario focuses on the emails that include attachments that either have an empty body or contain phrases that could indicate the unauthorized disclosure of information.

CS-IP-1

Passwords

Monitors communications for the unauthorized sharing of passwords. The scenario searches for a set of letters, symbols and numbers used with close proximity to the word “password” and for phrases that relate to the potential disclosure of a password.

CS-PW-1-Passwords

Anti Money Laundering (AML)

Monitors communications that could indicate a breach of anti-money laundering legislation including concealment of where funds originated.

FC-AML-1

Sanctions

Monitors communications concerning countries on the OFAC Sanctions list and any suspicious activity or business activity that is not permitted.

FC-SAN-1

External Trade Errors – Apologies*

Monitors communications that are indicative of a person apologizing about an order or trade error.

E-ETE-1_Apologies

External Trade Errors*

Monitors communications that indicate a mistake or accident has been made in relation to trades.

E-ETE-2_Errors

External Trade Errors – Conflicts*

Monitors for indications of a conflict that arose from situations where something did not go according to the plan or was done without any authorization.

E-ETE-3_Conflicts

Language Deviations

Monitors for instances where there are non-Latin letters in communications (excluding punctuation and emoticons).

LNG-LD-1-non-latin-letters

Language Shifts

Scenario monitors for instances where there is a change in the language used in business-related communications. This could be an indication of someone trying to hide something and avoid monitoring. The scenario focuses on the communications where both Latin and non-Latin letters and characters (excluding punctuation and emoticons) are in the close proximity. This scenario does not monitor for communications where there is a single letter with a diacritical mark or communications that are written using only non-Latin letters.

LNG-LD-1-Language_shift

URL Finder

Scenario looks for communications that contain URL links only. Short text such as signatures and disclaimers can be present.

PAT-UC-1_URL_Finder

Hidden Messages

Scenario looks for the instances where HTML/CSS are used to hide the message For example, when the following script is present:
● To hide parts of the message – “display:none”
● To set the font size to 0 – “font-size:0px”
● To make the text transparent – “opacity:0.0”

PAT-UC-2_Hidden_Messages

Hidden Messages 2

Scenario looks for instances where the color of the text and the background color of the message are the same i.e. not visible to the eye.

PAT-UC-2_Hidden_Messages2

Personal Email (Self)

Monitors communications sent by Monitored Employees to their own personal email addresses (Gmail, Yahoo etc.) where there are attachments present (excludes small attachments e.g. company logos). This can be used to identify situations where confidential, sensitive or proprietary documents are sent by employees to themselves.

PAT-UC-3_Personal_Email

Personal Email (Other)

Monitors communications sent by Monitored Employees to external contacts with personal email addresses (Gmail, Yahoo etc.) where there are attachments present (excludes small attachments e.g. company logos). This can be used to identify situations where confidential, sensitive or proprietary documents are being sent externally.

PAT-UC-5_Personal_Email

Programming Language

Scenario looks for the presence of programming language in communications sent to external contacts. This can be used to identify situations where confidential, sensitive or proprietary code that should not be shared is being sent externally.

PAT-UC-4_Programming_Language

Font Deviations

Scenario looks for communications that contain unusual font styles such as writing in bold, italics and underlined font within one word.

PAT-UF-1_Font_Deviations

Relative Excessive Punctuation

Scenario monitors for instances where there are deviations in use of punctuation with an emphasis on the use of an excessive amount of question marks and exclamation marks. Excessive punctuation can be an indication of impatience or dissatisfaction, from clients or between employees, which requires attention.

PAT-UF-3_Relative_Excessive_Punctuation

Upper Case

Scenario monitors for instances where there are words in uppercase in short messages (sms, chats and short emails). Text in All Caps can be an indication of shouting or rude behavior, from clients or between employees, which requires attention.

PAT-UF-3_Upper_case

Symbols in Text

Scenario monitors for the presence of symbols in communications linked to a recognized language (obfuscation). For example, “Symb0l”; “pa$$word”.

PAT-UF-4_Symbols_in_text

Different Lines

Scenario looks for the communications where participants send messages across different lines in order to hide the meaning of a word or a phrase.

PAT-UF-5_Different_lines

Unwanted Research 1

Monitors communications for instances of unwanted research where there is no response to research. Scenarios excludes labels that identify white-listed researchers.

BEH-UW-1

Unwanted Research 2

Scenario monitors communications for instances of unwanted research where the trader responds to reject the research. Scenarios excludes labels that identify white-listed researchers.

BEH-UW-2

BEHAVOXDATALAB

build your own products & plugins with
our robust development environment

Harness the power of our platform to easily build what your company needs.

Turn the lights on

Get Access to a Live Demo