Multi-firm review into off-channel communications

Multi-firm reviews Published: 07/08/2025 Last updated: 07/08/2025

This publication presents our findings on firms’ approach to off-channel communications, by which we mean those that take place outside of monitored, recorded channels a firm has permitted. 

1. Summary

All firms in our sample could evidence action taken to improve their approach, though to varying degrees. 

Most, but not all, firms in our sample continue to identify breaches of their internal policies. They occurred across all staff grades, with 41% involving individuals at director grade or above. Care needs to be taken when interpreting the breach data outlined in this report. For example, a breach of a firm’s internal policy may not represent a breach of FCA rules. 

Ongoing breaches demonstrate the importance of firms also focussing on improvements in behaviour and not just in detecting off-channel communications. 

2. Why we did this work

Robust record keeping and monitoring of communications is essential for firms to detect and investigate misconduct. It also serves as an important safeguard for firms in client disputes and litigation. Off-channel communications has been a particular area of attention for wholesale banks over the past few years.

3. Who this applies to

This multi-firm review will be of interest to wholesale banks and other firms in scope of the recordkeeping rules set out in SYSC 10A.

4. Our rules and what firms need to do

The FCA’s rules on the recording and monitoring of telephone and electronic communications are detailed in SYSC 10A and reaffirmed in Market Watch 66

Firms must record, monitor and ensure communications related to in-scope activities are auditable, including conversations leading to such activities. They must also take reasonable steps to prevent employees from using unrecorded channels for these communications. 

Our regime captures communications on regulated activities set out in SYSC 10A, such as arranging deals in investments and dealing in investments as agent. It does not cover discussions of non-regulated activities such as meeting logistics. However, repeated breaches of a firm’s own internal policy – especially if it involves a senior leader or reflects an increasing trend – may still warrant supervisory attention.

Our regime does not explicitly address specific encrypted apps or channels, despite their growing use over the past few years. Consistent with outcomes-based regulation, we do not intend to introduce new rules to cater for every potential scenario related to communication monitoring.  

5. What we did

We scoped a focussed piece of work with the aim of sharing actions firms have taken to improve their management of off-channel communications. This approach allows firms to learn from others and reflect on their own approach. 

We were reliant on the breach data provided to us. We did not collect personal devices and interrogate them for evidence of off-channel communications.

We surveyed eleven wholesale banks, both large and small, requesting information on policy enhancements they had implemented and the Management Information (MI) they use. We then held follow-up discussions with firms and industry panels.  

We thank the firms for their contributions, which allow us to share our findings with all wholesale banks and provide insights that may be relevant to other sectors. 

6. What we found

All firms in our sample had improved their processes over the past two years.

6.1. Frameworks

Actions we saw that firms had taken included:

  • updating policy terminology for mobile devices in policies to include new technologies like smart watches
  • streamlining the process for employees to submit self-disclosed off-channel messages, ensuring multiple authorised communication channels are available and, contingency plans to record and archive communications, when primary systems are down
  • prohibiting personal numbers in out-of-office replies and directories
  • establishing a dedicated helpline to guide staff on off-channel communications and integrating common queries into training programmes 

Large firms have adopted a single, global recording and monitoring policy across jurisdictions to ensure consistency. In such cases, firms should also ensure their policies meet UK standards and that implementation practices align with them.

6.2. Surveillance

Examples of action firms had taken included:  

  • updating surveillance lexicons to include terms associated with emerging communication channels and identifying 'channel hopping', where employees switch from recorded to non-recorded channels. These lexicons also included non-text communications, such as emojis and GIFs, and were capable of surveilling voice notes and video messages.  
  • firms using sophisticated technology to enhance surveillance by integrating natural language processing alongside existing lexicon-based models and exploring AI to filter out false alerts.
  • two firms monitoring and analysing staffs’ on-channel behaviour and detecting unexpectedly low usage of approved applications across peer groups to detect potential usage of off-channel communications.
  • most firms in our sample were providing corporate devices to client-facing staff to reinforce the separation of work-related and personal activities, though this is not required under our rules. Some firms used brightly coloured devices for easy identification, particularly in restricted areas like trading floors. Surveillance managers we spoke to favoured corporate devices, citing improved monitoring, recording, and control as well as the expectation it sets among staff. While some firms offered them broadly, others limited them to specific client-facing or transactional-facing staff.  

6.3. Third-party vendors (TPVs)

We observed an increase in third-party providers facilitating the monitoring and recording of different communication channels, along with an increase in approved applications available to staff. However, some firms reported challenges with TPV solutions, including service outages that disrupted recording and monitoring, data reconciliation issues that made it difficult for firms to validate that the right communications had been captured at all times to validate captured communications, and delays or missing recorded data from vendors.

TPVs do not always perform as expected. One transcription service, for example, was largely inaccurate. Poor service can also discourage employees from using recorded channels, reinforcing the need for firms to maintain strong oversight of their vendors and the quality of their services. 

We also remind firms that regulatory responsibilities in relation to SYSC 10A cannot be transferred to third parties. 

6.4. Management Information (MI)

MI varied based on firm size and complexity. Our review focused on the types of information firms collected and presented rather than how MI was used in decision-making. Larger firms generally had more sophisticated MI, while smaller firms had simpler frameworks. 

The most comprehensive MI in large firms included:

  • Detailed breach tracking, covering corporate titles, business areas, communication channels and severity gradings.
  • Remedial project updates, including adverse audits and second line of defence (2LOD) findings for executive oversight.
  • Framework effectiveness assessment, with attestation and training completion rates, plus surveillance alert disposition rates.
  • Third-party vendor KPIs, used for assurance or identifying service gaps. 
  • Corporate device and BYOD monitoring that tracked activation and usage to detect potential non-compliance. 
  • Trend analysis, metrics which tracked across months or quarters using well-considered RAG thresholds, with accompanied commentary on negative trends. 
  • Meeting minutes we reviewed showed that comprehensive MI contributed to fuller discussions.

Less comprehensive MI in large firms included: 

  • A focus solely on breach metrics without broader context or reference data/narrative about the broader framework. Oversight committees could only react to breach trends rather than analyse underlying causes. 

The most comprehensive MI in smaller firms included:

  • Breach data was reported at the group level, with the best examples including UK-specific metrics. 
  • Service level agreements (SLAs) for reviewing alerts were monitored using RAG thresholds, and trend analysis was conducted for alert and investigation volumes. 
  • Issues and enhancement programme updates were tracked with regular progress reports. 

Less comprehensive MI in smaller firms:

  • Limited to spot-checking outcomes for in-scope staff.

6.5. Breaches

We requested firms’ breach data from the preceding 12 months. 3 firms reported no breaches, while 8 firms disclosed a total of 178 breaches, with 131 concentrated in 3 firms. As we say above, breaches of firms’ internal policies aren’t necessarily breaches of FCA rules.

Chart

Data table

Download

Careful consideration needs to be given to these numbers.A high number may indicate effective detection systems,  while a low number does not necessarily suggest the framework is effective. 

Breaches occurred across all staff grades, with 41% involving individuals at the director grade or above. 

Chart

Data table

Download

Note: Breaches data is from the sample’s wholesale banking operations. Staff grade terminology across firms has been standardised as above. One low-level incident involving a group of interns has been recorded as one incident. Graph captures 8 firms as 3 firms reported 0 breaches. Where breaches involved individuals with no defined grade – such as contractors – these have been counted in the total breach figures but excluded from grade-based ratio analysis.

6.6. Consequence management

Firms are responsible for deciding how to address breaches of internal policy on unapproved communications, particularly when they don’t violate SYSC 10A. Disciplinary actions that firms reported they may apply ranged from policy reminders and refresher training to caution letters, formal warnings and performance review impacts. 

For more serious breaches, some firms outlined stricter consequences, including capping performance grades, limiting bonuses, imposing time-bound promotion restrictions, and dismissal with formal notes in professional references. However, our review found no evidence of the most severe penalties being administered.

Training played a key role in reinforcing expectations. Some firms emphasised in the training self-reporting and speaking up about off-channel communications. Role-targeted, scenario-based sessions incorporated real examples from surveillance to make training more effective.

7. Next steps

Based on our findings, firms may wish to consider the following key questions: 

  • Do employees fully understand their responsibility to record all relevant communications?
  • Does leadership set a strong 'tone from the top' and encourage a 'speak up' culture for compliance with SYSC 10A?
  • Are there any unreasonable barriers preventing staff from following the policy framework effectively?  
  • Does the firm effectively monitor third-party vendors to ensure expected performance and reliability? 
  • Is the firm's surveillance model well-aligned with its business model? 
  • Where a global framework is in place, do UK senior managers have sufficient oversight of its implementation and results? 
  • Do accountable executives receive the right MI to oversee compliance and assess surveillance effectiveness? 
  • Where patterns of non-compliance emerge, do accountable Senior Management Functions (SMFs) take prompt corrective action?

We will continue to  explore with firms their approach to off-channel communications and the outcomes being delivered. We will continue to discuss with them their breach data to identify trends and where further action could be required.