| Course | |||||
|---|---|---|---|---|---|
Compliance This is a mandatory compliance course for new MM staff including new promoter. In this course, new staff and promoter will learn how MM online training portal works, compliance guidelines that govern MM operation such as Money Service Business... | |||||
Compliance This is a mandatory compliance course for all MM staff including promoter after competed the first course, New Staff Training on Compliance. In this course, staff and promoter will learn how to detect suspicious transaction, fraud prevention and... | |||||
Compliance This is a refresher course. Staffs and promoters can refresh and get up to date information on Anti-Money Laundering, Counter Terrorism Financing & Targeted Financial Sanctions for Financial Institutions (AML/CTF & TFS). Based on MM training... | |||||
Compliance This document outlines the protocols and regulations governing e-money and remittance transactions at MMI. All staff, merchants, and business partners must adhere to these guidelines to ensure compliance and maintain the company's... | |||||
Compliance This program serves as an internal guideline for Mobile Money International Sdn Bhd (MMI) and is part of the broader MMI Risk Management and Internal Control Policy. It is crafted to adhere to Section 17A of the Malaysian Anti-Corruption... | |||||
Operations This Employee Handbook is designed to help you understand our company’s values, policies, and procedures, and to ensure you have the information you need to succeed in your role.
Inside, you’ll find important information about our... | |||||
Operations This is an introductory course for first time user of this MM Online Training portal. Here you will learn how to complete your course and use this portal. | |||||
Information Technology (IT) The purpose behind cybersecurity training for staff is always to alter their habits and behaviors, and create a sense of shared accountability, so that the company is safe from attacks. On this cybersecurity deployment/ implementation plan for... | |||||
Information Technology (IT) In this course, you will learn about Social Engineering, Phishing/Vishing/Smishing/Spear Phishing, Malware,DLP (Data Leak/Loss Prevention) and Some Case Study in Malaysia. Let you more clearly understand common security risks, Manage and secure... | |||||
Information Technology (IT) In this course, you will learn about Clean Desk Policy, Clear Screen Policy, Keep antivirus software up to date, Protect Customer Sensitive Information, Only access to authorized software and system application and Maintain high physical security... |