Loading
Get Suspicious Activity Report
How it works
-
Open form follow the instructions
-
Easily sign the form with your finger
-
Send filled & signed form or save
How to fill out the Suspicious Activity Report online
Filing a Suspicious Activity Report (SAR) is a crucial step in reporting known or suspected criminal activities that may affect financial institutions. This guide provides clear instructions to help users of all backgrounds successfully complete the form online.
Follow the steps to fill out the Suspicious Activity Report online.
- Click ‘Get Form’ button to obtain the form and open it in the editor.
- Start with Part I, where you fill in the Reporting Financial Institution Information. Enter the name, EIN, address, primary federal regulator, and state for your institution in the relevant fields.
- In Part II, provide information about the suspect, including their name, address, phone numbers, Social Security Number (SSN), and any forms of identification like a driver’s license. Ensure the details captured are accurate.
- Next, navigate to Part III to describe the suspicious activity. Specify the date of the activity, the total dollar amount involved, and summarize the characterization of the suspicious activity by checking the appropriate boxes.
- Continue in Part III by providing details such as the total amount of loss, recovery if applicable, and specify whether law enforcement has been notified about the activity.
- In Part IV, fill out the contact information for assistance, including names, titles, and phone numbers of individuals within your institution who can provide further information.
- Finally, move to Part V to explain the suspicious activity. Provide a detailed narrative that includes all relevant details and supporting documentation, retaining this information for five years.
- After completing the form, ensure that all sections are filled accurately before saving changes. You can then download, print, or share the report as needed.
Complete your Suspicious Activity Report online today.
Suspicious activity can refer to any incident, event, individual or activity that seems unusual or out of place. Some common examples of suspicious activities include: A stranger loitering in your neighborhood or a vehicle cruising the streets repeatedly. Someone peering into cars or windows.
Industry-leading security and compliance
US Legal Forms protects your data by complying with industry-specific security standards.
-
In businnes since 199725+ years providing professional legal documents.
-
Accredited businessGuarantees that a business meets BBB accreditation standards in the US and Canada.
-
Secured by BraintreeValidated Level 1 PCI DSS compliant payment gateway that accepts most major credit and debit card brands from across the globe.