{"id":17607,"date":"2026-03-13T06:45:57","date_gmt":"2026-03-13T06:45:57","guid":{"rendered":"https:\/\/www.hashmicro.com\/my\/blog\/?p=17607"},"modified":"2026-04-28T04:35:59","modified_gmt":"2026-04-28T04:35:59","slug":"source-of-funds","status":"publish","type":"post","link":"https:\/\/www.hashmicro.com\/my\/blog\/source-of-funds\/","title":{"rendered":"Source of Funds: What It Is, Why It Matters &#038; How to Verify It"},"content":{"rendered":"<p>In the complex ecosystem of modern corporate finance and global regulatory compliance, money is the lifeblood that keeps operations running. However, simply having capital is no longer sufficient. Understanding exactly where that capital originates is equally critical and in Malaysia, it is a legal requirement.<\/p>\n<p>Malaysian financial institutions submitted approximately 317,435 suspicious transaction reports (STRs) in 2023 up from 242,914 the previous year. Furthermore, in December 2024, Parliament passed an amendment to the <a href=\"https:\/\/www.bnm.gov.my\/anti-money-laundering\">Anti-Money Laundering, Anti-Terrorism Financing and Proceeds of Unlawful Activities Act 2001 (AMLA)<\/a>, significantly tightening source of funds (SOF) obligations across all reporting institutions in Malaysia.<\/p>\n<p>Managing <a href=\"https:\/\/www.hashmicro.com\/my\/accounting-software?medium=moneysite-banner\">Source of Funds optimizes capital structure<\/a> and anchors financial compliance. This guide examines financing mechanisms, wealth distinctions, and future regulatory shifts.<\/p>\n<table style=\"border-collapse: collapse; background-color: #fffacd; box-shadow: 0 4px 8px rgba(0, 0, 0, 0.1); border-radius: 25px 25px 25px 25px;\" width=\"100%\">\n<tbody>\n<tr>\n<td style=\"padding: 15px; border: none;\">\n<h3 style=\"margin-bottom: 10px;\"><span style=\"background-color: #990000; color: #ffffff; padding: 5px;\"><b>Key Takeaways<\/b><\/span><\/h3>\n<ul>\n<li><a href=\"#1\"><strong>Source of funds (SOF)<\/strong><\/a> refers to the specific origin of the money used in a particular transaction it is distinct from source of wealth, which covers an individual&#8217;s or entity&#8217;s total accumulated assets.<\/li>\n<li>In Malaysia, SOF verification is a <strong><a href=\"#2\">legal obligation<\/a> <\/strong>under the Anti-Money Laundering, Anti-Terrorism Financing and Proceeds of Unlawful Activities Act 2001 (AMLA), administered by Bank Negara Malaysia <span id=\"1\"><\/span>(BNM).<\/li>\n<li><strong><a href=\"#3\">Acceptable proof of SOF<\/a> <\/strong>includes bank statements, audited financial statements, loan agreements, property sale documents, and investment portfolio records depending on whether the party is an individual or a corporate entity.<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<!-- <div id=\"toc_group_article\" style=''>\r\n\t<p style='font-size:25px;font-weight:bold; margin-bottom:0px'>\r\n\t\tTable of Content\r\n\t<\/p>\r\n\t<ul id=\"list_toc\" class='list_toc'><\/ul>\r\n<\/div>\r\n\r\n<div class=\"dropdown-fixed-top\" id=\"dropdown-fixed-top\">\r\n\t<div class=\"row\">\r\n\t\t<p id=\"pilihDaftarIsi\">Content Lists<\/p>\r\n\t\t<p><i class=\"td-icon-menu-down\"><\/i><\/p>\r\n\t<\/div>\r\n\t\r\n\t<div>\r\n\t\t<ul id=\"list_toc_top\" class='list_toc'><\/ul>\r\n\t<\/div>\r\n<\/div> -->\r\n\r\n<!-- TOC mobile -->\r\n<div id=\"placeholder-toc\"><\/div>\r\n<div id=\"toc\">\r\n    <div class=\"header\">\r\n\t<span class=\"toc-title\" id=\"toc-title\">Table of Content<\/span>\t\r\n\t <i class=\"toc-icon\">\r\n        <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"30\" height=\"30\" viewBox=\"0 0 24 24\" fill=\"none\" stroke=\"#000\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" class=\"header-icon\">\r\n          <path d=\"m6 9 6 6 6-6\" \/>\r\n        <\/svg>\r\n      <\/i>\r\n\t<\/div>\r\n    <div class=\"list\">\r\n      <ul id=\"toc-list\"><\/ul>\r\n    <\/div>\r\n <\/div>\r\n<!-- TOC mobile -->\r\n\r\n<style>\r\n\t@media (max-width: 992px) {\r\n\t\t#toc_group_article {\r\n\t\t\tpadding-top: 24px;\r\n\t\t}\r\n\t}\r\n\t\r\n\t#list_toc_float {\r\n\t\tmax-height: calc(100vh - 250px);\r\n\t\toverflow-y: auto;\r\n\t}\r\n\t\r\n\t#list_toc_top {\r\n\t\tdisplay: none;\r\n\t\tbackground: #fff;\r\n\t\tmargin-bottom: 4px;\r\n\t}\r\n\t\r\n\t#list_toc_top li {\r\n\t\tdisplay: block;\r\n\t\tmargin-left: 0;\r\n\t\tlist-style: none;\r\n\t}\r\n\t\r\n\t#list_toc_top a {\r\n\t\tpadding: 5px;\r\n\t\tdisplay: block;\r\n\t}\r\n\t\r\n\t#list_toc_top.show {\r\n\t\tdisplay: block;\r\n\t}\r\n\r\n\t#list_toc_top a {\r\n\t\tcolor: #434343;\r\n\t\tborder-bottom: 1px solid #bbb;\r\n\t}\r\n\t\r\n\t.dropdown-fixed-top {\r\n\t\tposition: fixed;\r\n\t\ttop: 59px;\r\n\t\twidth: 100%;\r\n\t\tz-index: 99;\r\n\t\tborder-bottom: 2px solid #9c171e;\r\n\t\tpadding: 12px;\r\n\t\tbackground: #fff;\r\n\t\twidth: 100%;\r\n\t\tcursor: pointer;\r\n\t\tdisplay: none;\r\n\t\tleft: 0;\r\n\t\tbox-shadow: 0 -2px 7px 6px rgba(0, 0, 0, 0.17);\r\n\t}\r\n\t\r\n\t#dropdown-fixed-top.show {\r\n\t\tanimation: showAnim 0.5s ease;\r\n\t\tdisplay: block;\r\n\t\topacity: 1;\r\n\t}\r\n\t\r\n\t@keyframes showAnim {\r\n\t\tfrom {\r\n\t\t\tdisplay: none;\r\n\t\t\topacity: 0;\r\n\t\t}\r\n\t\tto {\r\n\t\t\tdisplay: block;\r\n\t\t\topacity: 1;\r\n\t\t}\r\n\t}\r\n\t\r\n\t.dropdown-fixed-top #list_toc_top {\r\n\t\tmax-height: calc(50vh - 110px);\r\n\t\toverflow-y: scroll;\r\n\t}\r\n\t\r\n\t.dropdown-fixed-top .row {\r\n\t\tdisplay: flex;\r\n\t\tjustify-content: space-between\r\n\t}\r\n\t\r\n\t.dropdown-fixed-top .row p {\r\n\t\tmargin-bottom: 0;\r\n\t}\r\n\t\r\n\t#pilihDaftarIsi {\r\n\t\tmax-width: 100%;\r\n\t\toverflow: hidden;\r\n\t\twhite-space: nowrap;\r\n\t}\r\n\t\r\n\t@media (min-width: 1018px) {\r\n\t\t.dropdown-fixed-top {\r\n\t\t\tdisplay: none;\r\n\t\t}\r\n\t}\r\n\t\r\n\t#list_toc li {margin-bottom: 0;margin-top: 5px;}\r\n\t#list_toc > li > ul {padding-left: 20px;margin-bottom: 0;}\r\n\t#list_toc{height:max-content;transition:ease-in-out}\r\n\t#list_toc li {margin-bottom: 0;margin-top: 5px;}\r\n\t#list_toc_float li.active > a {color:#b1252d;background: #ffe1e3;}\r\n\t#list_toc_top li.active > a {color:#b1252d;background: #ffe1e3;}\r\n\t#list_toc_float li a {padding:3px 7px}\r\n\t#list_toc_float li a {\r\n\t\tdisplay: block;\r\n\t\tcolor: #000;\r\n\t\tmargin-bottom: 6px;\r\n\t\tpadding-top: 2px;\r\n\t\tpadding-bottom: 2px;\r\n\t\ttransition: all 0.2s ease-in-out;\r\n\t\tfont-size: 15px;\r\n\t\tline-height: 18px;\r\n\t}\r\n\t#list_toc_float li{list-style:none;list-style-position:inside; margin-left:0;}\r\n\t#list_toc_float a:hover{color:#b1252d;}\r\n\t\r\n\t#toc_group_float{\r\n\t\tline-height: 24px;\r\n\t\tmax-height: calc(100vh - 100px);\r\n\t\toverflow: auto;\r\n\t\tz-index: 99;\r\n\t\tdisplay:none!important;\r\n\t\tbackground:#fff;\r\n\t\ttransition:all 0.5s linear\r\n\t}\r\n\t\r\n\t@media (min-width:1019px){\r\n\t\t#toc_group_float {\r\n\t\t\tdisplay:block!important;\r\n\t\t}\r\n\t\t#toc_group_article {\r\n\t\t\tdisplay:none;\r\n\t\t}\t\t\t\t\r\n\t}\r\n\r\n<\/style>\r\n\r\n<style>\r\n\t@media (max-width: 992px) {\r\n\t\t#toc_group_article {\r\n\t\t\tpadding-top: 24px;\r\n\t\t}\r\n\t}\r\n\t\r\n\t#list_toc_float {\r\n\t\tmax-height: calc(100vh - 250px);\r\n\t\toverflow-y: auto;\r\n\t}\r\n\t\r\n\t#list_toc_top {\r\n\t\tdisplay: none;\r\n\t\tbackground: #fff;\r\n\t\tmargin-bottom: 4px;\r\n\t}\r\n\t\r\n\t#list_toc_top li {\r\n\t\tdisplay: block;\r\n\t\tmargin-left: 0;\r\n\t\tlist-style: none;\r\n\t}\r\n\t\r\n\t#list_toc_top a {\r\n\t\tpadding: 5px;\r\n\t\tdisplay: block;\r\n\t}\r\n\t\r\n\t#list_toc_top.show {\r\n\t\tdisplay: block;\r\n\t}\r\n\r\n\t#list_toc_top a {\r\n\t\tcolor: #434343;\r\n\t\tborder-bottom: 1px solid #bbb;\r\n\t}\r\n\t\r\n\t.dropdown-fixed-top {\r\n\t\tposition: fixed;\r\n\t\ttop: 59px;\r\n\t\twidth: 100%;\r\n\t\tz-index: 99;\r\n\t\tborder-bottom: 2px solid #9c171e;\r\n\t\tpadding: 12px;\r\n\t\tbackground: #fff;\r\n\t\twidth: 100%;\r\n\t\tcursor: pointer;\r\n\t\tdisplay: none;\r\n\t\tleft: 0;\r\n\t\tbox-shadow: 0 -2px 7px 6px rgba(0, 0, 0, 0.17);\r\n\t}\r\n\t\r\n\t#dropdown-fixed-top.show {\r\n\t\tanimation: showAnim 0.5s ease;\r\n\t\tdisplay: block;\r\n\t\topacity: 1;\r\n\t}\r\n\t\r\n\t@keyframes showAnim {\r\n\t\tfrom {\r\n\t\t\tdisplay: none;\r\n\t\t\topacity: 0;\r\n\t\t}\r\n\t\tto {\r\n\t\t\tdisplay: block;\r\n\t\t\topacity: 1;\r\n\t\t}\r\n\t}\r\n\t\r\n\t.dropdown-fixed-top #list_toc_top {\r\n\t\tmax-height: calc(50vh - 110px);\r\n\t\toverflow-y: scroll;\r\n\t}\r\n\t\r\n\t.dropdown-fixed-top .row {\r\n\t\tdisplay: flex;\r\n\t\tjustify-content: space-between\r\n\t}\r\n\t\r\n\t.dropdown-fixed-top .row p {\r\n\t\tmargin-bottom: 0;\r\n\t}\r\n\t\r\n\t#pilihDaftarIsi {\r\n\t\tmax-width: 100%;\r\n\t\toverflow: hidden;\r\n\t\twhite-space: nowrap;\r\n\t}\r\n\t\r\n\t@media (min-width: 1018px) {\r\n\t\t.dropdown-fixed-top {\r\n\t\t\tdisplay: none;\r\n\t\t}\r\n\t}\r\n\t\r\n\t#list_toc li {margin-bottom: 0;margin-top: 5px;}\r\n\t#list_toc > li > ul {padding-left: 20px;margin-bottom: 0;}\r\n\t#list_toc{height:max-content;transition:ease-in-out}\r\n\t#list_toc li {margin-bottom: 0;margin-top: 5px;}\r\n\t#list_toc_float li.active > a {color:#b1252d;background: #ffe1e3;}\r\n\t#list_toc_top li.active > a {color:#b1252d;background: #ffe1e3;}\r\n\t#list_toc_float li a {padding:3px 7px}\r\n\t#list_toc_float li a {\r\n\t\tdisplay: block;\r\n\t\tcolor: #000;\r\n\t\tmargin-bottom: 6px;\r\n\t\tpadding-top: 2px;\r\n\t\tpadding-bottom: 2px;\r\n\t\ttransition: all 0.2s ease-in-out;\r\n\t\tfont-size: 15px;\r\n\t\tline-height: 18px;\r\n\t}\r\n\t#list_toc_float li{list-style:none;list-style-position:inside; margin-left:0;}\r\n\t#list_toc_float a:hover{color:#b1252d;}\r\n\t\r\n\t#toc_group_float{\r\n\t\tline-height: 24px;\r\n\t\tmax-height: calc(100vh - 100px);\r\n\t\toverflow: auto;\r\n\t\tz-index: 99;\r\n\t\tdisplay:none!important;\r\n\t\tbackground:#fff;\r\n\t\ttransition:all 0.5s linear\r\n\t}\r\n\t\r\n\t@media (min-width:1019px){\r\n\t\t#toc_group_float {\r\n\t\t\tdisplay:block!important;\r\n\t\t\t}\r\n\t\t\t\t#toc_group_article {\r\n\t\t\tdisplay:none;\r\n\t\t}\r\n\t}\r\n\r\n<\/style>\r\n\r\n<!-- START ToC styling  -->\r\n<style>\r\n\t\/* Simple styling for the TOC *\/\r\n\t\r\n\t#toc ul li:last-child {\r\n    padding-bottom: 16px; \/* Adjust the value as needed *\/\r\n}\r\n\r\n.td-fix-index {\r\n\t transform: unset !important;\r\n     -webkit-transform: unset !important; \r\n}\r\n.footer-contact .td-fix-index {\r\n\t transform: translateZ(0) !important;\r\n     -webkit-transform: translateZ(0) !important; \r\n}\r\n\t.tdb_single_content .tdb-block-inner.td-fix-index{\r\n\t\tposition: static;\r\n\t}\r\n\t\r\n\r\n\t\r\n#toc {\r\n  background-color: #FFF;\r\n\tpadding: 17px 24px 0px 24px !important;\r\n  margin-bottom: 20px;\r\n\/*   border: 1px solid #9C171E; *\/\r\n  border-radius: 6px;\r\n\tdisplay: none;\r\n  max-width: 100%;\r\n  transition: .4s ease height;\r\n\tmargin-left: 0;\r\n\toverflow: hidden;\r\n}\r\n\r\n#toc .header{\r\n  display: flex;\r\n  align-items: center;\r\n  justify-content: space-between;\r\n\tbackground-color: transparent;\r\n}\r\n\t\r\n\t#toc.sticky .header{\r\n\t\tpadding: 4px 0;\r\n\t}\r\n\t\r\n.header p{\r\n  font-size: 18px !important;\r\n  font-weight: 600 !important;\r\n  color: #393939;\r\n   margin-bottom: 0;\r\n  \/* margin-top: 20px; *\/\r\n}\r\n\r\n.toc-icon{\r\n  float: right;\r\n\/*   visibility: hidden; *\/\r\n}\r\n\r\n\t.toc-title{\r\n\t\tmargin-right: auto;\r\n\/* \t\tpadding-left: 20px; *\/\r\n\t\tfont-weight: 600;\r\n\t\talign-self: center;\t}\t\r\n\r\n#toc ul {\r\n  list-style-type: none;\r\n  padding-left: 0;\r\n}\r\n\t\r\n#toc.sticky ul{\r\n\toverflow-y: auto;\r\n\tmax-height: 250px;\r\n\tmargin-top: 0px;\r\n\tpadding-top: 20px;\r\n\/* \tborder-top: 1px solid #d3d3d3; *\/\r\n}\r\n\t\r\n#toc ul li {\r\n\/*   margin-bottom: 10px; *\/\r\n  margin-bottom: 10px;\r\n\tmargin-left: 0;\r\n\ttransition: .2s ease;\r\n\tcursor: pointer;\r\n}\r\n\t\r\n\t#toc.sticky ul li {\r\n\t  margin-right: 10px;\r\n\t}\r\n\t\r\n.td-post-content #toc-list li a:hover, .td-post-content #toc-list a.active{\r\n\tbackground-color: #FFF;\r\n\/* \tpadding: 8px 16px 8px 16px; *\/\r\n\tpadding: 4px 16px 4px 16px;\r\n\tborder-radius: 6px;\r\n\tcolor: #9c171e !important;\r\n\tfont-weight: 600 !important;\r\n}\r\n\t\r\n\t.td-post-content #toc-list li:hover a, .td-post-content #toc-list a.active{\r\n\t\tcolor: #9C171E !important;\r\n\t\tfont-weight: 600 !important;\r\n\t}\r\n\t\r\n.td-post-content #toc-list a.active{\r\n\tfont-weight: bold !important;\r\n\tcolor: #9C171E !important;\r\n}\r\n\t\r\n#toc a, .td-post-content #toc-list a {\r\n  text-decoration: none;\r\n  color: #ea1717 !important;\r\n  transition: .2s ease;\r\n\tfont-weight: 400 !important;\r\n\tdisplay: block;\r\n\t\r\n\tpadding: 4px 16px 4px 0;\r\n}\r\n\r\n#toc.sticky {\r\n  position: fixed;\r\n\/*   top: 73px; *\/\r\n\tbottom: 0;\r\n  z-index: 100; \r\n  box-shadow: 0 2px 5px rgba(0,0,0,0.1); \r\n\twidth: 100%; \r\n\tbackground-color: #FFF;\r\n\/* \tbackground-color: #FFF1F1; *\/\r\n\tborder-bottom: 1px solid #ea1717;\r\n\/*   border: 1px solid #393939; *\/\r\n  box-shadow: 0px 0px 14px 0px #00000040;\r\n  cursor: pointer;\r\n\tanimation: fadein .3s ease;\r\n\tpadding: 12px 16px !important;\r\n}\r\n\t\r\n\t.fadein{\r\n\t\tanimation: fadein .3s ease;\r\n\t}\r\n\t\r\n\t.fadeout{\r\n\t\tanimation: fadeout .3s ease;\r\n\t}\r\n\t\r\n\t\r\n\t@keyframes fadein{\r\n\t\t0% {\r\n\t\t\topacity: 0;\r\n\t\t}\r\n\t\t100%{\r\n\t\t\topacity: 1;\r\n\t\t}\r\n\t}\r\n\t\r\n\t@keyframes fadeout{\r\n\t\t0% {\r\n\t\t\topacity: 1;\r\n\t\t}\r\n\t\t100%{\r\n\t\t\topacity: 0;\r\n\t\t}\r\n\t}\r\n\r\n\t\r\n#toc.sticky .header p{\r\n\tmargin-bottom: 10px;\r\n\tmargin-top: 10px;\r\n}\r\n\r\n#toc.sticky .toc-icon{\r\n  visibility: visible;\r\n\/* \ttransition: 0.4s ease; *\/\r\n}\r\n\t\r\n\t.toc-icon{\r\n\t\talign-items: center;\r\n    \tdisplay: flex;\r\n\t}\r\n\t\r\n\tsvg.header-icon{\r\n\/* \t\tbackground-color: #9c171e; *\/\r\n\t\tbackground-color: #FFF;\r\n\t\tborder-radius: 30px;\r\n\t\tpadding: 5px;\r\n\t}\r\n\r\n#toc.sticky .list{\r\n\/*   max-height: 0; *\/\r\n  transition: height 0.4s ease;\r\n}\r\n\t\r\n\t#toc .list{\r\n\/*   max-height: 0; *\/\r\n  transition: height 0.4s ease;\r\n}\r\n\r\n#toc .header.active .toc-icon{\r\n\ttransform: rotate(0deg); \r\n\topacity: 1;\r\n}\r\n\r\n\t#toc .header.active + .list {\r\n\t  max-height: 200px; \/* Adjust this value as needed *\/\r\n\t  opacity: 1;\r\n\t}\r\n\t\r\n\t#placeholder-toc{\r\n\/* \t\tdisplay: none; *\/\r\n\t}\r\n\t\r\n\t@media (min-width: 768px) and (max-width: 991px){\r\n\t\t#toc.sticky{\r\n\/* \t\t\ttop: 104px; *\/\r\n\t\t\tbottom: 0px;\r\n\t\t}\r\n\t\t\r\n\t\t#toc{\r\n\t\t\twidth: unset !important;\r\n\t\t}\r\n\t}\r\n\t\r\n\t@media (max-width: 767px){\r\n\t\t#toc{\r\n\t\t\twidth: 100% !important;\r\n\t\t\tdisplay: inline-block;\r\n\t\t}\r\n\t\t\r\n\t\t#toc.sticky{\r\n\t\t\twidth: 90% !important;\r\n\/* \t\t\ttop: 81px; *\/\r\n\t\t\tbottom: 60px;\r\n\t\t\tmargin-left: auto;\r\n\t\t\tmargin-right: auto;\r\n\t\t\tpadding: 0 16px;\r\n\t\t\tright: 5%;\r\n\t\t}\r\n\t}\r\n\t\r\n\t<\/style>\r\n<!-- END ToC styling  -->\r\n\r\n<!-- ToC List for mobile -->\r\n<script>\r\n \/\/ Generate TOC based on headings\r\ndocument.addEventListener(\"DOMContentLoaded\", function() {\r\n  \/\/ Get the element that will contain the TOC\r\n  const tocList = document.getElementById('toc-list');\r\n\r\n  \/\/ Get the element with the ID 'article-left'\r\n  const article = document.querySelector('.td-post-content');\r\n\r\n  \/\/ Find all h2 elements within 'myarticle'\r\n  const headers = article.getElementsByTagName('h2');\r\n\r\n  \/\/ Loop through the h2 elements and create a list item for each one\r\n  for (let i = 0; i < headers.length; i++) {\r\n    const header = headers[i];\r\n    const headerText = header.textContent;\r\n\/\/     const headerId = 'header-' + i;\r\n    const headerId = headerText\r\n    .toLowerCase()\r\n    .trim()\r\n    .replace(\/[^\\w\\s-]\/g, '')  \/\/ hapus tanda baca\r\n    .replace(\/\\s+\/g, '-'); \/\/ ganti spasi jadi \"-\"\r\n\r\n    \/\/ Set an ID for the header if it doesn't have one\r\n    header.setAttribute('id', headerId);\r\n\r\n    \/\/ Create a list item for the TOC\r\n    const listItem = document.createElement('li');\r\n\r\n    \/\/ Create a link for the list item\r\n    const link = document.createElement('a');\r\n    link.setAttribute('href', '#' + headerId);\r\n    link.textContent = headerText;\r\n\r\n    \/\/ Append the link to the list item\r\n    listItem.appendChild(link);\r\n\r\n    \/\/ Append the list item to the TOC list\r\n    tocList.appendChild(listItem);\r\n  }\r\n});\r\n\r\n\/\/ Keep height and placement of content using placeholder in place of TOC\r\ndocument.addEventListener(\"DOMContentLoaded\", function() {\r\n  const toc = document.querySelector('#toc');\r\n  const placeholderToc = document.querySelector('#placeholder-toc');\r\n\r\n  function setPlaceholderHeight() {\r\n    placeholderToc.style.height = `${toc.offsetHeight}px`;\r\n  }\r\n\r\n  \/\/ Set the initial height of the placeholder\r\n  setPlaceholderHeight();\r\n\r\n  \/\/ Update the height on window resize\r\n  window.addEventListener('resize', setPlaceholderHeight);\r\n});\r\n  const tocTitle = document.querySelector('#toc-title'); \/\/ Assuming header-faq is the element for TOC title\r\n\r\n\/\/ Sticky TOC and update heading\r\ndocument.addEventListener(\"DOMContentLoaded\", function() {\r\n  const toc = document.querySelector('#toc');\r\n  const footer = document.querySelector('.td-footer-template-wrap');\r\n  const tocParent = toc.parentElement;\r\n  const divTop = tocParent.getBoundingClientRect().top + window.pageYOffset;\r\n  const tocHeight = toc.offsetHeight;\r\n  const triggerPoint = divTop + tocHeight + 700;\r\n  const footerHeight = footer.offsetHeight;\r\n  const triggerFooterPoint = footer.getBoundingClientRect().top + window.pageYOffset - footerHeight - footerHeight - footerHeight;\r\n  const phtoc = document.querySelector('#placeholder-toc');\r\n  const headers = document.querySelectorAll('.td-post-content h2');\r\n  const navLinks = document.querySelectorAll('#toc-list a');\r\n\t\r\n\tconst panel2 = document.querySelector(\"#toc .list\");\r\n\tvar icon = document.querySelector(\".toc-icon\");\r\n\r\n  let activeLink = null; \/\/ Declare activeLink outside the loop\r\n\t\r\n  \/\/ Function to handle scroll and add\/remove .sticky class\r\n  function handleScroll() {\r\n    const windowTop = window.pageYOffset || document.documentElement.scrollTop;\r\n    let currentHeader = '';\r\n\r\n    \/\/ Highlight user progress as the heading comes\r\n    headers.forEach(header => {\r\n\t\tconst headerTop = header.offsetTop;\r\n\t\tconst headerHeight = header.clientHeight;\r\n\t\tif (window.scrollY >= (headerTop - headerHeight + 700)) {\r\n\t\t\tconst currentHeaderId = header.getAttribute('id');\r\n\t\t\tconst currentHeaderText = document.getElementById(currentHeaderId).textContent;\r\n\/\/ \t\t\tconsole.log(\"current header text:\", currentHeaderText);\r\n\t\t\ttocTitle.textContent = currentHeaderText;\r\n\t\t\tcurrentHeader = currentHeaderId;\r\n\t\t\t\r\n\t\t\tif(window.innerWidth < 767){\r\n\t\t\t\ttocTitle.textContent = 'Table of Content';\r\n\t\t\t}\r\n\t\t}\r\n\t});\r\n\r\n    navLinks.forEach(link => {\r\n      link.classList.remove('active');\r\n      if(currentHeader != '') {\r\n\t\t  if (link.getAttribute('href').includes(currentHeader)) {\r\n\t\t\t  link.classList.add('active');\r\n\t\t  }\r\n\t  }\r\n    });\r\n\/\/     if (windowTop < triggerFooterPoint) {\r\n\/\/         toc.style.display = 'block';\r\n\/\/ \t}else{\r\n\/\/         toc.style.display = 'none';\r\n\/\/ \t}\r\n    \/\/ Update TOC title if sticky\r\n    if (windowTop > triggerPoint) {\r\n      if (!toc.classList.contains('sticky')) {\r\n        phtoc.style.display = \"block\";\r\n        toc.classList.add('sticky');\r\n        toc.style.width = `${tocParent.offsetWidth}px`; \/\/ Set width to match the parent element\r\n        toc.setAttribute('style', 'width: ' + tocParent.offsetWidth + 'px !important;');\r\n        toc.style.backgroundColor = \"#FFF\";\r\n\t\tpanel2.style.height = '0px';\r\n\t\t  icon.style.transform = \"rotate(180deg)\";\r\n\t\t  if(window.innerWidth < 767){\r\n\/\/ \t\t\t  const tocs = document.querySelector('#toc.sticky');\r\n\t\t\t  tocTitle.textContent = 'Table of Content'; \/\/ Reset title\r\n       \t\t  toc.style.width = '150px'; \/\/ Set width to match the parent element\r\n\t\t  }\r\n      }\r\n      if (currentHeader) {\r\n\/\/         console.log(\"activeLink:\", activeLink);\r\n        if (activeLink) {\r\n\/\/           tocTitle.textContent = activeLink.textContent; \/\/ Update TOC title\r\n          tocTitle.textContent = activeLink ? activeLink.textContent : \"\"; \/\/ Update title only if activeLink exists\r\n        }\r\n      }\r\n    } else {\r\n      toc.classList.remove('sticky');\r\n      phtoc.style.display = \"none\";\r\n      toc.style.width = 'unset'; \/\/ Reset to original width\r\n      toc.style.backgroundColor = \"#FFF\";\r\n      tocTitle.textContent = 'Table of Content'; \/\/ Reset title\r\n\t\tpanel2.style.height = panel2.scrollHeight + \"px\";\r\n\t\ticon.style.transform = \"rotate(180deg)\";\r\n    }\r\n  }\r\n\r\n    \/\/ Attach the scroll event listener to the window\r\n    window.addEventListener('scroll', handleScroll);\r\n\r\n    \/\/ Initial call to handleScroll to set the correct state on load\r\n    handleScroll();\r\n});\r\n\t\r\n\t\/\/ Open toggle TOC\r\n\t  document.addEventListener(\"DOMContentLoaded\", function() {\r\n\t\tvar tocHeader = document.querySelector(\"#toc .header\");\r\n\t\tvar toc = document.querySelector(\"#toc\");\r\n\t\tvar icon = document.querySelector(\".toc-icon\");\r\n\t\tconst tocTitle = document.querySelector('#toc-title');\r\n\t\tconst tocs = document.querySelector('#toc.sticky');\r\n \t\tconst tocParent = toc.parentElement;\t\t  \r\n\r\n\t\t  tocHeader.addEventListener(\"click\", function() {\r\n\t\t\tvar panel = this.nextElementSibling;\r\n\t\t\tif (panel.style.height !== '0px') { \/\/ Check if height is not 0px\r\n\t\t\t  panel.style.height = '0px'; \/\/ Set height to 0 for full collapse\r\n\t\t\t  icon.style.transform = \"rotate(180deg)\";\r\n\/\/ \t\t\t\ttoc.style.paddingBottom = '6px'; \r\n\t\t\t\tif(window.innerWidth > 768){\r\n\t\t\t\t\tif(!toc.classList.contains('sticky')){\r\n\t\t\t\t\t\ttoc.style.width = \"unset\";\r\n\/\/ \t\t\t\t\t\ttoc.setAttribute('style', 'width: ' + tocParent.offsetWidth + 'px !important;');\r\n\t\t\t\t\t}\r\n\t\t\t\t\tif (toc.classList.contains('sticky')){\r\n\t\t\t\t\t\ttoc.style.width = '${tocParent.offsetWidth}px';\r\n\t\t\t\t\t\ttoc.setAttribute('style', 'width: ' + tocParent.offsetWidth + 'px !important;');\r\n\t\t\t\t\t}\r\n\t\t\t\t}\r\n\t\t\t\tif(window.innerWidth < 767){\r\n\t\t\t\t\ttoc.style.width = \"unset\"; \/\/ Reset width\r\n\t\t\t\t}\r\n\t\t\t\ttoc.style.backgroundColor = \"#FFF1F1\";\r\n\t\t\t} else {\r\n\t\t\t  panel.style.height = panel.scrollHeight + \"px\";\r\n\t\t\t  icon.style.transform = \"rotate(0deg)\";\r\n\t\t\t  toc.style.backgroundColor = \"#FFF\";\r\n\t\t\t  tocTitle.textContent = 'Table of Content'; \/\/ Reset title\r\n\t\t\t\ttoc.style.paddingBottom = '24px';\r\n\t\t\t \tif(window.innerWidth < 767){\r\n\t\t\t\t\ttoc.style.width = `${tocParent.offsetWidth}px`; \/\/ Set width to match the parent element\r\n\t\t\t\t\ttoc.setAttribute('style', 'width: ' + tocParent.offsetWidth + 'px !important;');\r\n\t\t\t\t}\r\n\t\t\t}\r\n\t\t  });\r\n\r\n\t\t  \/\/ Close TOC when a link inside it is clicked\r\n\t\t  var tocLinks = document.querySelectorAll(\"#toc .list a\");\r\n\t\t  tocLinks.forEach(function(link) {\r\n\t\t\tlink.addEventListener(\"click\", function() {\r\n\t\t\t  var panel = document.querySelector(\"#toc .list\");\r\n\t\t\t  panel.style.height = '0px'; \/\/ Set height to 0 for full collapse\r\n\t\t\t  icon.style.transform = \"rotate(180deg)\";\r\n\t\t\t  toc.style.backgroundColor = \"#FFF\";\r\n\t\t\t});\r\n\t\t  });\r\n\t\t});\r\n<\/script>\r\n\r\n<!-- <script>\r\n\tvar pilihDaftarIsi = document.getElementById('pilihDaftarIsi');\r\n\t\r\n\tdocument.addEventListener('DOMContentLoaded', function() {\r\n\t\tvar dropdownFixedTop = document.querySelector('.dropdown-fixed-top');\r\n\r\n\t\tdropdownFixedTop.addEventListener('click', function() {\r\n\t\t\tvar dropdownContent = this.querySelector('.list_toc');\r\n\t\t\tdropdownContent.classList.toggle('show');\r\n\t\t});\r\n\r\n\t\twindow.addEventListener('click', function(event) {\r\n\t\t\tvar listTocTop = document.getElementById('list_toc_top');\r\n\r\n\t\t\tif (!dropdownFixedTop.contains(event.target)) {\r\n\t\t\t\tlistTocTop.classList.remove('show');\r\n\t\t\t}\r\n\t\t});\r\n\t});\r\n\t\r\n\tvar daftarIsiContainer = document.getElementById('toc_group_article');\r\n\tvar dropdownFixedTop = document.getElementById('dropdown-fixed-top');\r\n    var triggered = false; \/\/ Flag to keep track of whether the function has been triggered\r\n\r\n    window.addEventListener('scroll', function() {\r\n        if (!triggered && isCompletelyScrolledPast(daftarIsiContainer)) {\r\n            showSectionDropdownFixedTop(false);\r\n            triggered = true;\r\n        } else if (triggered && !isCompletelyScrolledPast(daftarIsiContainer)) {\r\n            showSectionDropdownFixedTop(true);\r\n            triggered = false;\r\n        }\r\n    });\r\n\r\n    function isCompletelyScrolledPast(element) {\r\n        var elementTop = element.getBoundingClientRect().top;\r\n        var elementBottom = element.getBoundingClientRect().bottom;\r\n        return elementTop < 0 && elementBottom < 0;\r\n    }\r\n\r\n    function showSectionDropdownFixedTop(show) {\r\n\t\tif (show) {\r\n\t\t\tdropdownFixedTop.classList.remove(\"show\");\r\n\t\t} else {\r\n\t\t\tdropdownFixedTop.classList.add(\"show\");\r\n\t\t}\r\n    }\r\n\r\n\/\/ Scrollspy function to highlight the active TOC item based on the scroll position\r\n  function scrollSpy(tocClass) {\r\n    const scrollPosition = window.scrollY;\r\n\r\n    \/\/ Find the active h2 and h3 headings based on their position in the corresponding TOC\r\n    let activeH2 = null;\r\n    let activeH3 = null;\r\n\r\n    const tocItems = document.querySelectorAll(`.${tocClass} li`);\r\n    tocItems.forEach(item => {\r\n      const a = item.querySelector('a');\r\n      if (!a) return;\r\n      const href = a.getAttribute('href');\r\n      const targetId = href.substring(1); \/\/ Remove the '#' from the href to get the target ID\r\n      const targetElement = document.getElementById(targetId);\r\n      if (!targetElement) return;\r\n\r\n      const targetTop = targetElement.getBoundingClientRect().top + scrollPosition;\r\n      const nextItem = item.nextElementSibling;\r\n      const nextTop = nextItem ? nextItem.getBoundingClientRect().top + scrollPosition : Infinity;\r\n\r\n      if (targetTop <= scrollPosition + 150) {\r\n        if (a.parentElement.parentElement === tocItems) {\r\n          \/\/ The h2 heading is at the root level of the TOC\r\n          activeH2 = { id: targetId, level: 'h2' };\r\n        } else {\r\n          \/\/ The h3 heading is nested under an h2 heading\r\n          const parentH2 = a.parentElement.parentElement.previousElementSibling;\r\n          if (parentH2) {\r\n            const h2Link = parentH2.querySelector('a');\r\n            if (h2Link) {\r\n              const h2Href = h2Link.getAttribute('href');\r\n              const h2Id = h2Href.substring(1);\r\n              activeH2 = { id: h2Id, level: 'h2' };\r\n            }\r\n          }\r\n          activeH3 = { id: targetId, level: 'h3' };\r\n        }\r\n      }\r\n\r\n      if (targetTop > scrollPosition + 150 && nextTop > scrollPosition + 150 && !activeH3) {\r\n        \/\/ Reset the activeH2 when there are no more active h3 headings\r\n        activeH2 = null;\r\n      }\r\n    });\r\n\r\n    \/\/ Update the active state for the TOC items\r\n    tocItems.forEach(item => {\r\n      item.classList.remove('active');\r\n      const a = item.querySelector('a');\r\n      if (a) {\r\n        const href = a.getAttribute('href');\r\n        const targetId = href.substring(1);\r\n        if ((activeH2 && activeH2.id === targetId) || (activeH3 && activeH3.id === targetId)) {\r\n          item.classList.add('active');\r\n\t\t  pilihDaftarIsi.innerHTML = a.textContent;\r\n        }\r\n      }\r\n    });\r\n  }\r\n\r\n  \/\/ Call scrollSpy for each TOC on window scroll\r\n  const tocClasses = ['list_toc', 'list_toc_float', 'list_toc_top']; \/\/ Add other TOC class names here if you have more than two instances\r\n  tocClasses.forEach(tocClass => {\r\n    window.addEventListener('scroll', () => scrollSpy(tocClass));\r\n  });\r\n<\/script> -->\r\n<!-- END script lama -->\r\n\t\r\n<script>\r\n    \/\/ Scrollspy function to highlight the active TOC item based on the scroll position\r\n  function scrollSpy(tocClass) {\r\n    const scrollPosition = window.scrollY;\r\n\r\n    \/\/ Find the active h2 and h3 headings based on their position in the corresponding TOC\r\n    let activeH2 = null;\r\n    let activeH3 = null;\r\n\r\n    const tocItems = document.querySelectorAll(`.${tocClass} li`);\r\n    tocItems.forEach(item => {\r\n      const a = item.querySelector('a');\r\n      if (!a) return;\r\n      const href = a.getAttribute('href');\r\n      const targetId = href.substring(1); \/\/ Remove the '#' from the href to get the target ID\r\n      const targetElement = document.getElementById(targetId);\r\n      if (!targetElement) return;\r\n\r\n      const targetTop = targetElement.getBoundingClientRect().top + scrollPosition;\r\n      const nextItem = item.nextElementSibling;\r\n      const nextTop = nextItem ? nextItem.getBoundingClientRect().top + scrollPosition : Infinity;\r\n\r\n      if (targetTop <= scrollPosition + 150) {\r\n        if (a.parentElement.parentElement === tocItems) {\r\n          \/\/ The h2 heading is at the root level of the TOC\r\n          activeH2 = { id: targetId, level: 'h2' };\r\n        } else {\r\n          \/\/ The h3 heading is nested under an h2 heading\r\n          const parentH2 = a.parentElement.parentElement.previousElementSibling;\r\n          if (parentH2) {\r\n            const h2Link = parentH2.querySelector('a');\r\n            if (h2Link) {\r\n              const h2Href = h2Link.getAttribute('href');\r\n              const h2Id = h2Href.substring(1);\r\n              activeH2 = { id: h2Id, level: 'h2' };\r\n            }\r\n          }\r\n          activeH3 = { id: targetId, level: 'h3' };\r\n        }\r\n      }\r\n\r\n      if (targetTop > scrollPosition + 150 && nextTop > scrollPosition + 150 && !activeH3) {\r\n        \/\/ Reset the activeH2 when there are no more active h3 headings\r\n        activeH2 = null;\r\n      }\r\n    });\r\n\r\n    \/\/ Update the active state for the TOC items\r\n    tocItems.forEach(item => {\r\n      item.classList.remove('active');\r\n      const a = item.querySelector('a');\r\n      if (a) {\r\n        const href = a.getAttribute('href');\r\n        const targetId = href.substring(1);\r\n        if ((activeH2 && activeH2.id === targetId) || (activeH3 && activeH3.id === targetId)) {\r\n          item.classList.add('active');\r\n        }\r\n      }\r\n    });\r\n  }\r\n\r\n  \/\/ Call scrollSpy for each TOC on window scroll\r\n  const tocClasses = ['list_toc', 'list_toc_float', 'list_toc_top']; \/\/ Add other TOC class names here if you have more than two instances\r\n  tocClasses.forEach(tocClass => {\r\n    window.addEventListener('scroll', () => scrollSpy(tocClass));\r\n  });\r\n<\/script>\r\n\t\r\n\r\n<!-- ToC List for desktop side bar, diganti jadi inject by php, di code snippet \"Sidebar Accordion\" -->\r\n<!-- <script>\r\n\tdocument.addEventListener('DOMContentLoaded', function() {\r\n        \/\/ Fungsi untuk mengubah teks menjadi format id\r\n        function formatId(text) {\r\n            return text.trim().replace(\/[^\\w\\d]+\/g, '_');\r\n        }\r\n\r\n        \/\/ Fungsi untuk membuat nested list\r\n        function createNestedList(parentNode, children) {\r\n            if (children.length === 0) return;\r\n\r\n            const nestedUl = document.createElement('ul');\r\n            children.forEach(child => {\r\n                const nestedLi = document.createElement('li');\r\n                const nestedA = document.createElement('a');\r\n                nestedA.textContent = child.title;\r\n                nestedA.href = `#${child.id}`;\r\n                nestedLi.appendChild(nestedA);\r\n                nestedUl.appendChild(nestedLi);\r\n\r\n                if (child.children.length > 0) {\r\n                    createNestedList(nestedLi, child.children);\r\n                }\r\n            });\r\n\r\n            parentNode.appendChild(nestedUl);\r\n        }\r\n\r\n        \/\/ Membuat objek untuk menyimpan daftar h2 dan h3 beserta judulnya\r\n        const headings = [];\r\n\r\n           \/\/ Mengambil semua elemen h2 dan h3\r\n        const elements = document.querySelectorAll('.td-post-content h2');\r\n\t\t\t\/\/, .td-post-content h3\r\n\r\n        elements.forEach(element => {\r\n            if (element.tagName === 'H2') {\r\n                const id = formatId(element.textContent);\r\n                element.id = id;\r\n\t\t\t\tif(element.textContent.toLowerCase() === \"key takeaways\") {return;} \/\/ Biar ga nampilin Key Takeaways di ToC\r\n                headings.push({ level: 'h2', id: id, title: element.textContent, children: [] });\r\n            } else if (element.tagName === 'H3') {\r\n                const id = formatId(element.textContent);\r\n                element.id = id;\r\n                if (headings.length > 0) {\r\n                    headings[headings.length - 1].children.push({ level: 'h3', id: id, title: element.textContent, children: [] });\r\n                }\r\n            }\r\n        });\r\n\r\n        \/\/ Membuat list HTML dari objek headings\r\n        const ul = document.getElementById('list_toc');\r\n        let currentUl = ul;\r\n        headings.forEach(heading => {\r\n            const li = document.createElement('li');\r\n            const a = document.createElement('a');\r\n            a.textContent = heading.title;\r\n            a.href = `#${heading.id}`;\r\n            li.appendChild(a);\r\n\r\n            if (heading.level === 'h2') {\r\n                \/\/ Menyimpan ul saat ini untuk menambahkan nested ul\r\n                currentUl = li;\r\n                ul.appendChild(li);\r\n            } else if (heading.level === 'h3') {\r\n                if (!currentUl.lastElementChild || currentUl.lastElementChild.tagName !== 'UL') {\r\n                    \/\/ Jika belum ada nested ul, buat satu\r\n                    const nestedUl = document.createElement('ul');\r\n                    currentUl.appendChild(nestedUl);\r\n                    currentUl = nestedUl;\r\n                }\r\n                currentUl.appendChild(li);\r\n            }\r\n\r\n            createNestedList(li, heading.children);\r\n        });\r\n\t\t\/\/ Dapatkan elemen ul dengan id 'list_toc_float'\r\nconst ulFloat = document.getElementById('list_toc');\r\nconst ulJourney = document.getElementById('list_journey');\r\n\r\n\/\/ Dapatkan isi (child elements) dari ul dengan id 'list_toc_float'\r\n\tif (ulFloat !== null) {\r\n\t\tconst clonedChildren = ulFloat.cloneNode(true).children;\r\n\t\tconst ulToc = document.getElementById('list_toc_float');\r\n\t\tconst ulTocTop = document.getElementById('list_toc_top');\r\n\t\tif ((ulToc !== null || ulToc !== undefined) && window.innerWidth > 1018){\r\n\t\t\tulToc.append(...clonedChildren);\r\n\t\t} else {\r\n\t\t\tulTocTop.append(...clonedChildren);\r\n\t\t}\r\n\t} \r\n\r\n\tif (ulJourney !== null) {\r\n\t\tconst clonedChildrenJourney = ulJourney.cloneNode(true).children;\r\n\t\tconst ulTocJourney = document.getElementById('list_toc_journey');\r\n\t\tulTocJourney.append(...clonedChildrenJourney);\r\n\t} \r\n\r\n\r\n\r\n\r\n\t\r\n        \/\/ Fungsi untuk mengambil tinggi navbar\r\n        function getNavbarHeight() {\r\n            const navbar = document.getElementById('tdi_34');\r\n            return navbar ? navbar.offsetHeight : 0;\r\n        }\r\n\r\n        \/\/ Fungsi untuk menambahkan offset posisi scroll\r\n        function scrollToElementWithOffset(elementId) {\r\n            const element = document.getElementById(elementId);\r\n            if (element) {\r\n                const offset = getNavbarHeight();\r\n                const elementPosition = element.getBoundingClientRect().top;\r\n                const offsetPosition = elementPosition - offset-40;\r\n\r\n                window.scrollBy({\r\n                    top: offsetPosition,\r\n                    behavior: 'smooth'\r\n                });\r\n            }\r\n        }\r\n\r\n        \/\/ Fungsi untuk menangani klik pada tautan judul\r\n        function handleTitleClick(event) {\r\n            event.preventDefault();\r\n            const href = event.target.getAttribute('href').substr(1);\r\n            scrollToElementWithOffset(href);\r\n        }\r\n\r\n        \/\/ Tambahkan event listener untuk semua tautan judul\r\n        const titleLinks = document.querySelectorAll('a[href^=\"#\"]');\r\n        titleLinks.forEach(link => {\r\n            link.addEventListener('click', handleTitleClick);\r\n        });\r\n\t});\r\n    <\/script> -->\r\n<!-- \t<style>#toc_group_float{display:block !important}<\/style> -->\r\n\n<p>Automate your Source of Funds tracking for real time transparency. Use our accounting software to secure every audit trail today.<\/p>\n<p><span data-sheets-root=\"1\">\r\n    <div class=\"adjustable-banner-wrap\">\r\n        <a href=\"https:\/\/www.hashmicro.com\/my\/accounting-software?medium=moneysite-banner\" target=\"_blank\">\r\n            <img decoding=\"async\" loading=\"lazy\"\r\n                 src=\"https:\/\/www.hashmicro.com\/my\/blog\/wp-content\/uploads\/2026\/03\/my_accounting_desktop.webp\"\r\n                 data-desktop-src=\"https:\/\/www.hashmicro.com\/my\/blog\/wp-content\/uploads\/2026\/03\/my_accounting_desktop.webp\"\r\n                 data-mobile-src=\"https:\/\/www.hashmicro.com\/my\/blog\/wp-content\/uploads\/2026\/03\/my_accounting_mobile.webp\"\r\n                 alt=\"Accounting\"\r\n                 class=\"responsive-image-banner\">\r\n\r\n            \r\n            <div class=\"adjustable-banner-overlay\" style=\"width: 40%\">\r\n                <p class=\"adjustable-banner-text\">Take control of finances and &lt;span class='adjustable-highlight'&gt;stop costly errors early.&lt;\/span&gt;<\/p>\r\n                <div class=\"adjustable-banner-btn\">Schedule a Consultation<\/div>\r\n            <\/div>\r\n\r\n        <\/a>\r\n    <\/div>\r\n<script>\r\n    \/\/ check which image to use based on screensize\r\n    document.addEventListener(\"DOMContentLoaded\", function() {\r\n        function updateImageSource() {\r\n            var images = document.querySelectorAll('.responsive-image-banner');\r\n            var screenWidth = window.innerWidth;\r\n\r\n            images.forEach(function(img) {\r\n                var mobileSrc = img.getAttribute('data-mobile-src');\r\n                var desktopSrc = img.getAttribute('data-desktop-src');\r\n\r\n                if (screenWidth < 576 && mobileSrc) {\r\n                    img.setAttribute('src', mobileSrc);\r\n                } else {\r\n                    img.setAttribute('src', desktopSrc);\r\n                }\r\n            });\r\n        }\r\n\r\n        \/\/ Initial check\r\n        updateImageSource();\r\n\r\n        \/\/ Update on resize\r\n        window.addEventListener('resize', updateImageSource);\r\n    });\r\n<\/script><br \/>\n<\/span><\/p>\n<h2 id=\"understanding-the-concept-of-source-of-funds\"><strong>Understanding the Concept of Source of Funds<\/strong><\/h2>\n<p>Source of funds refers to the specific origin of the money used in a particular transaction or business operation. It answers one direct question: &#8220;where did the money for this specific activity come from?&#8221; While this might seem straightforward, the answer is often layered with complexity particularly in the corporate world, where capital flows through multiple channels, jurisdictions, and financial instruments before reaching its final destination.<\/p>\n<p>In a business context, this concept can be viewed through two distinct but interconnected lenses.<\/p>\n<ul>\n<li>In a business context, this concept can be viewed through two distinct but interconnected lenses: the corporate finance perspective and the regulatory compliance perspective.<\/li>\n<li>From a corporate finance standpoint, it refers to how a company finances its operations and growth. Does the money come from the profits generated by the business itself, or does it come from external investors and creditors? Understanding this helps management assess the company&#8217;s leverage, liquidity, and overall financial strategy.<\/li>\n<\/ul>\n<h2 id=\"the-importance-of-source-of-funds-in-corporate-accounting\"><strong>The Importance of Source of Funds in Corporate Accounting<\/strong><\/h2>\n<p>In corporate accounting, meticulous recording of where money comes from is the bedrock of accurate financial reporting. The fundamental accounting equation<\/p>\n<div style=\"background: #f4f8ff; border-left: 4px solid #2563eb; padding: 18px 24px; border-radius: 6px; margin: 24px 0;\">\n<p style=\"margin: 0; font-size: 1.1em;\"><strong>Assets = Liabilities + Equity<\/strong><\/p>\n<\/div>\n<p>relies entirely on properly categorizing every influx of capital. Every dollar that enters a company must be accounted for, and its origin dictates how it is recorded across the balance sheet, the income statement, and the statement of cash flows.<\/p>\n<h3>Impact on the Balance Sheet<\/h3>\n<p>The balance sheet provides a snapshot of a company&#8217;s financial position at a specific point in time. When a company acquires new capital, it must be recorded as an asset usually cash.<\/p>\n<p>However, double-entry bookkeeping requires a corresponding entry to explain where that asset came from.<\/p>\n<ul>\n<li>If the money originated from a bank loan, it is recorded as a <strong>liability<\/strong>.<\/li>\n<li>If it came from issuing shares, it is recorded as <strong>equity<\/strong>.<\/li>\n<\/ul>\n<p>Furthermore, misclassifying the origin of these assets can severely distort a company&#8217;s financial position, misleading investors, creditors, and internal management about the company&#8217;s true leverage.<\/p>\n<h3>Transparency in the Cash Flow Statement<\/h3>\n<p>The statement of cash flows is arguably the most critical financial document for assessing a company&#8217;s liquidity and it is entirely structured around the origin and destination of money. The statement categorizes cash flows into three areas: Operating Activities, Investing Activities, and Financing Activities.<\/p>\n<p>As a result, understanding the precise origin of incoming cash is necessary to populate this statement correctly. For example, cash received from customers (Operating) signals a healthy, self-sustaining business model, whereas cash from selling essential machinery (Investing) or taking on high-interest debt (Financing) may indicate underlying financial distress.<\/p>\n<h3>Ensuring Bookkeeping Accuracy<\/h3>\n<p>Accurate bookkeeping requires a granular understanding of every transaction. Accountants rely on detailed documentation to ensure every financial event is correctly captured in the general ledger. Without clear <a href=\"https:\/\/www.hashmicro.com\/my\/blog\/journal-entry-example\/\">documentation of financial origin<\/a>, accountants cannot confidently perform essential bookkeeping tasks leading to disorganized ledgers and potential audit failures.<\/p>\n<h2 id=\"internal-vs-external-sources-of-funds\"><strong>Internal vs. External Sources of Funds<\/strong><\/h2>\n<p>When analyzing how a business finances its operations, capital origins are broadly categorized into two main types: internal and external. The balance a company strikes between these two categories significantly impacts its risk profile, cost of capital, and operational autonomy.<\/p>\n<h3>Internal Sources of Capital<\/h3>\n<p>Internal financing refers to capital generated from within the business itself. This is generally the most cost-effective approach to funding operations and growth, because it does not incur interest expenses or dilute ownership. Key internal sources include:<\/p>\n<ul>\n<li><strong>Retained Earnings:<\/strong> This is the most common and vital source of internal financing. Retained earnings are the cumulative net income kept within the business rather than distributed to shareholders as dividends. Profitable companies rely heavily on retained earnings to fund research and development, purchase new equipment, or expand into new markets.<\/li>\n<li><strong>Working Capital Optimization: <\/strong>by aggressively <a href=\"https:\/\/www.hashmicro.com\/my\/blog\/working-capital\/\">managing current assets and liabilities<\/a>, a company can free up trapped cash. This includes tightening credit terms to collect receivables faster, negotiating longer payment terms with suppliers, and minimizing excess inventory.<\/li>\n<li><strong>Sale of Assets:<\/strong> companies can generate cash by divesting underperforming or non-core assets. While this provides a quick influx of capital, it is typically a one-time event and is not a sustainable long-term financing strategy.<\/li>\n<\/ul>\n<h3>External Sources of Capital<\/h3>\n<p>When internal generation is insufficient to meet strategic goals, companies must look outward. External financing involves bringing in capital from outside the organization and is divided into debt and equity.<\/p>\n<ul>\n<li><strong>Debt Financing:<\/strong> this involves borrowing money that must be repaid over time with interest. Common forms include commercial bank loans, corporate bonds, lines of credit, and <a href=\"https:\/\/www.hashmicro.com\/my\/blog\/banking-industry\/\">asset-based lending<\/a>. The primary advantage is that the business owner retains full control, and interest payments are often <a href=\"https:\/\/www.hashmicro.com\/my\/blog\/tax-deduction\/\">tax-deductible<\/a>. However, excessive debt increases financial risk and can strain cash flow during downturns.<\/li>\n<li><strong>Equity Financing:\u00a0<\/strong>this involves raising capital by selling a portion of ownership. Startups and high-growth enterprises often turn to venture capital, angel investment, private equity, or Initial Public Offerings (IPOs). While equity does not require regular interest payments, it dilutes the original owners&#8217; control and share of future profits.<\/li>\n<\/ul>\n<h2 id=\"source-of-funds-vs-source-of-wealth-key-differences\"><strong>Source of Funds vs. Source of Wealth: Key Differences<\/strong><\/h2>\n<p>In the realm of financial compliance, risk management, and regulatory auditing, two terms are frequently used often interchangeably by laymen, but with strict distinctions by professionals: Source of Funds (SOF) and Source of Wealth (SOW). Understanding the difference between these two concepts is critical for compliance officers, accountants, and legal advisors.<\/p>\n<table style=\"width: 100%; border-collapse: collapse; font-family: Arial, sans-serif; font-size: 15px;\">\n<tbody>\n<tr>\n<td style=\"background-color: #990000; color: #ffffff; padding: 10px 14px; font-weight: bold; width: 25%;\">Dimension<\/td>\n<td style=\"background-color: #990000; color: #ffffff; padding: 10px 14px; font-weight: bold; width: 37.5%;\">Source of Funds (SOF)<\/td>\n<td style=\"background-color: #990000; color: #ffffff; padding: 10px 14px; font-weight: bold; width: 37.5%;\">Source of Wealth (SOW)<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: #ffffff; padding: 10px 14px; font-weight: bold; border: 1px solid #CCCCCC;\">Focus<\/td>\n<td style=\"background-color: #ffffff; padding: 10px 14px; border: 1px solid #CCCCCC;\">Transaction-specific<\/td>\n<td style=\"background-color: #ffffff; padding: 10px 14px; border: 1px solid #CCCCCC;\">Holistic and historical<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: #f5f5f5; padding: 10px 14px; font-weight: bold; border: 1px solid #CCCCCC;\">Question Asked<\/td>\n<td style=\"background-color: #f5f5f5; padding: 10px 14px; border: 1px solid #CCCCCC;\">Where did this payment come from?<\/td>\n<td style=\"background-color: #f5f5f5; padding: 10px 14px; border: 1px solid #CCCCCC;\">How did this client accumulate their total wealth?<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: #ffffff; padding: 10px 14px; font-weight: bold; border: 1px solid #CCCCCC;\">Time Horizon<\/td>\n<td style=\"background-color: #ffffff; padding: 10px 14px; border: 1px solid #CCCCCC;\">Immediate \/ recent<\/td>\n<td style=\"background-color: #ffffff; padding: 10px 14px; border: 1px solid #CCCCCC;\">Lifetime or business lifespan<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: #f5f5f5; padding: 10px 14px; font-weight: bold; border: 1px solid #CCCCCC;\">Typical Documentation<\/td>\n<td style=\"background-color: #f5f5f5; padding: 10px 14px; border: 1px solid #CCCCCC;\">Bank statements (3\u20136 months), sale contracts, loan agreements<\/td>\n<td style=\"background-color: #f5f5f5; padding: 10px 14px; border: 1px solid #CCCCCC;\">Tax returns, audited financials, inheritance records, investment portfolios<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: #ffffff; padding: 10px 14px; font-weight: bold; border: 1px solid #CCCCCC;\">When Required<\/td>\n<td style=\"background-color: #ffffff; padding: 10px 14px; border: 1px solid #CCCCCC;\">All transactions above risk threshold<\/td>\n<td style=\"background-color: #ffffff; padding: 10px 14px; border: 1px solid #CCCCCC;\">High-risk clients, PEPs, large cross-border transfers (EDD)<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h3>Why the Distinction Matters<\/h3>\n<p>Regulators require businesses to understand both SOF and SOW, but apply them differently based on risk level. For standard, low-risk corporate transactions, verifying the SOF is typically sufficient.<\/p>\n<p>However, for high-risk clients such as Politically Exposed Persons (PEPs) or clients from high-risk jurisdictions regulatory bodies require Enhanced Due Diligence (EDD), which mandates the verification of both SOF and SOW.<\/p>\n<p>A client might have a legitimate SOF for a specific transaction (for example, money transferred from a reputable bank), but if their overall SOW cannot be logically explained<span id=\"2\"><\/span> (for example, a low-level public official with a net worth of RM 50 million), it raises a significant red flag for potential money laundering or corruption.<\/p>\n<h2 id=\"aml-kyc-compliance\"><strong>Compliance: Anti-Money Laundering (AML) and KYC<\/strong><\/h2>\n<p><img decoding=\"async\" class=\"size-full wp-image-17657 aligncenter\" src=\"https:\/\/www.hashmicro.com\/my\/blog\/wp-content\/uploads\/2026\/03\/AML-and-KYC-Compliance.webp\" alt=\"AML and KYC Compliance\" width=\"1536\" height=\"1024\" srcset=\"https:\/\/www.hashmicro.com\/my\/blog\/wp-content\/uploads\/2026\/03\/AML-and-KYC-Compliance.webp 1536w, https:\/\/www.hashmicro.com\/my\/blog\/wp-content\/uploads\/2026\/03\/AML-and-KYC-Compliance-300x200.webp 300w, https:\/\/www.hashmicro.com\/my\/blog\/wp-content\/uploads\/2026\/03\/AML-and-KYC-Compliance-1024x683.webp 1024w, https:\/\/www.hashmicro.com\/my\/blog\/wp-content\/uploads\/2026\/03\/AML-and-KYC-Compliance-768x512.webp 768w, https:\/\/www.hashmicro.com\/my\/blog\/wp-content\/uploads\/2026\/03\/AML-and-KYC-Compliance-630x420.webp 630w, https:\/\/www.hashmicro.com\/my\/blog\/wp-content\/uploads\/2026\/03\/AML-and-KYC-Compliance-150x100.webp 150w, https:\/\/www.hashmicro.com\/my\/blog\/wp-content\/uploads\/2026\/03\/AML-and-KYC-Compliance-696x464.webp 696w, https:\/\/www.hashmicro.com\/my\/blog\/wp-content\/uploads\/2026\/03\/AML-and-KYC-Compliance-1068x712.webp 1068w\" sizes=\"(max-width: 1536px) 100vw, 1536px\" \/><\/p>\n<p>The global financial system is under constant threat from illicit actors attempting to legitimize the proceeds of crime. In Malaysia, Bank Negara Malaysia (BNM) serves as the primary regulator for AML\/CFT compliance issuing binding policy documents, conducting audits, and supervising reporting institutions across the financial sector.<\/p>\n<p>In 2024, BNM amended its AML\/CFT policy documents to include countering proliferation financing (CPF), and Parliament subsequently passed the AMLA Amendment Bill 2024 to further strengthen enforcement and extend the scope of regulatory obligations. Furthermore, Malaysia underwent a FATF Mutual Evaluation onsite visit in February 2025 underscoring the urgency for all reporting institutions to maintain robust SOF verification frameworks.<\/p>\n<h3>The Role of KYC in Financial Tracking<\/h3>\n<p>Know Your Customer (KYC) is the foundational process that businesses use to verify the identity of their clients and assess the risks associated with maintaining a business relationship. KYC is not merely about collecting identity documents it involves understanding the nature of the client&#8217;s business, their expected transaction patterns, and, crucially, where their money comes from.<\/p>\n<p>In Malaysia, BNM&#8217;s Customer Due Diligence (CDD) requirements mandate SOF verification for transactions above RM 25,000, wire transfers, e-services, and new business relationships. This prevents businesses from inadvertently becoming conduits for the layering or integration phases of the money laundering cycle.<\/p>\n<h3>Risk-Based Approach to Verification<\/h3>\n<p>Modern AML compliance relies on a risk-based approach, where the level of scrutiny applied to verifying financial origins is directly proportional to the perceived risk of the client or the transaction. In practice, this means:<\/p>\n<ul>\n<li><strong>Simplified Due Diligence (SDD): <\/strong>applied to low-risk scenarios, such as publicly traded companies subject to strict regulatory oversight, where standard checks may suffice.<\/li>\n<li><strong>Customer Due Diligence (CDD): <\/strong>the standard level of verification applied to most business relationships, requiring solid proof of where the transaction money originated.<\/li>\n<li><strong>Enhanced Due Diligence (EDD): <\/strong>applied to high-risk scenarios including transactions involving shell companies, complex offshore trusts, or clients from countries with weak AML controls. EDD requires exhaustive documentation of both SOF and SOW, and typically requires senior management approval before proceeding.<\/li>\n<\/ul>\n<h3>The Consequences of Non-Compliance<\/h3>\n<p>The penalties for failing to adequately verify and document the origins of client or corporate funds are severe. Regulatory bodies worldwide have levied billions of dollars in fines against institutions that failed to maintain robust AML controls.<\/p>\n<p>In Malaysia, individual directors and compliance officers can be held personally liable for institutional AML failures. Beyond financial penalties, businesses face criminal prosecution, revocation of operating licenses, and reputational damage that can trigger <span id=\"3\"><\/span>a mass exodus of legitimate clients and investors.<\/p>\n<h2 id=\"documenting-proof\"><strong>How to Document and Prove Source of Funds<\/strong><\/h2>\n<p>Establishing a theoretical understanding of financial origins is only half the challenge. The practical difficulty lies in obtaining, verifying, and securely storing the documentary evidence required to prove it. This concept is often referred to as Proof of Source of Funds (PoSOF).<\/p>\n<h3>Acceptable Documentation for Individuals<\/h3>\n<p>When a business is dealing with an individual (for example, a high-net-worth investor injecting capital into a startup, or an individual purchasing luxury real estate), the required documentation must clearly link the individual to the origin of the money. Standard acceptable documents include:<\/p>\n<ul>\n<li><strong>Bank Statements:<\/strong> Typically covering the last three to six months, showing the accumulation of funds or the specific incoming transfer that generated the balance.<\/li>\n<li><strong>Employment and Income Proof:<\/strong> <a href=\"https:\/\/www.hashmicro.com\/my\/blog\/payslip\/\">Recent payslips<\/a>, annual tax returns, or EA forms that justify the individual&#8217;s financial capacity.<\/li>\n<li><strong>Property Sale Documents: <\/strong>A\u00a0finalized contract of sale or a completion statement from a solicitor, if the money originated from selling real estate.<\/li>\n<li><strong>Investment Portfolio Statements: <\/strong>from recognized brokerage firms, showing the liquidation of stocks, bonds, or mutual funds.<\/li>\n<li><strong>Inheritance Documents:<\/strong> A copy of the will, a grant of probate, and a letter from the executor or solicitor confirming the inherited amount.<\/li>\n<\/ul>\n<h3>Acceptable Documentation for Corporate Entities<\/h3>\n<p>When verifying the capital origins of a corporate entity (such as a B2B client paying for a massive software deployment or a holding company making an acquisition), the documentation shifts toward corporate financial health and structural transparency. Acceptable proof includes:<\/p>\n<ul>\n<li><strong>Audited Financial Statements:<\/strong> The most reliable<a href=\"https:\/\/www.hashmicro.com\/my\/blog\/financial-statement\/\"> proof of corporate financial health<\/a> and revenue generation, prepared by an independent certified public accountant.<\/li>\n<li><strong>Corporate Tax Returns:<\/strong> Official filings submitted to Lembaga Hasil Dalam Negeri (LHDN) or equivalent national tax authorities, providing a government-verified record of corporate income.<\/li>\n<li><strong>Loan Agreements:<\/strong> If the corporation is funding the transaction through debt, a signed loan facility agreement from a recognized financial institution is required.<\/li>\n<li><strong>Shareholder Agreements and Cap Tables:<\/strong> If the funds were raised through equity, documentation showing the issuance of new shares and receipt of capital from investors.<\/li>\n<li><strong>Contracts and Invoices:<\/strong> For funds generated through standard business operations, high-value commercial contracts and corresponding <a href=\"https:\/\/www.hashmicro.com\/my\/blog\/invoice-payment\/\">paid invoices<\/a> can serve as proof of legitimate revenue.<\/li>\n<\/ul>\n<h3>Best Practices for Document Collection<\/h3>\n<p>Collecting this sensitive information requires tact, security, and efficiency. Businesses should establish<a href=\"https:\/\/www.hashmicro.com\/my\/blog\/accounting-cycle\/\"> clear, written policies detailing<\/a> exactly what documents are acceptable.<\/p>\n<p>In addition, staff must be trained to review documents critically looking for inconsistencies such as bank statements that appear altered or income that does not logically align with the individual&#8217;s profile.<\/p>\n<p>Furthermore, because these documents contain highly sensitive financial data, they must be stored in strict accordance with the Personal Data Protection Act 2010 (PDPA) in Malaysia, with robust cybersecurity measures in place to prevent data breaches.<\/p>\n<h2 id=\"analyzing-financial-health\"><strong>Analyzing Source of Funds for Financial Health<\/strong><\/h2>\n<p><img decoding=\"async\" class=\"size-full wp-image-17660 aligncenter\" src=\"https:\/\/www.hashmicro.com\/my\/blog\/wp-content\/uploads\/2026\/03\/Analyzing-Source-of-Funds-for-Financial-Health.webp\" alt=\"Analyzing Source of Funds for Financial Health\" width=\"1536\" height=\"1024\" srcset=\"https:\/\/www.hashmicro.com\/my\/blog\/wp-content\/uploads\/2026\/03\/Analyzing-Source-of-Funds-for-Financial-Health.webp 1536w, https:\/\/www.hashmicro.com\/my\/blog\/wp-content\/uploads\/2026\/03\/Analyzing-Source-of-Funds-for-Financial-Health-300x200.webp 300w, https:\/\/www.hashmicro.com\/my\/blog\/wp-content\/uploads\/2026\/03\/Analyzing-Source-of-Funds-for-Financial-Health-1024x683.webp 1024w, https:\/\/www.hashmicro.com\/my\/blog\/wp-content\/uploads\/2026\/03\/Analyzing-Source-of-Funds-for-Financial-Health-768x512.webp 768w, https:\/\/www.hashmicro.com\/my\/blog\/wp-content\/uploads\/2026\/03\/Analyzing-Source-of-Funds-for-Financial-Health-630x420.webp 630w, https:\/\/www.hashmicro.com\/my\/blog\/wp-content\/uploads\/2026\/03\/Analyzing-Source-of-Funds-for-Financial-Health-150x100.webp 150w, https:\/\/www.hashmicro.com\/my\/blog\/wp-content\/uploads\/2026\/03\/Analyzing-Source-of-Funds-for-Financial-Health-696x464.webp 696w, https:\/\/www.hashmicro.com\/my\/blog\/wp-content\/uploads\/2026\/03\/Analyzing-Source-of-Funds-for-Financial-Health-1068x712.webp 1068w\" sizes=\"(max-width: 1536px) 100vw, 1536px\" \/><\/p>\n<p>Beyond legal compliance and AML regulations, analyzing where a company gets its money is a fundamental aspect of assessing its overall financial health and long-term viability. Investors, creditors, and internal financial analysts continuously monitor the composition of a company&#8217;s capital stack to evaluate risk and performance.<\/p>\n<h3>The Cost of Capital<\/h3>\n<p>Every source of financing carries a cost. Debt carries an explicit cost in the form of interest rates, while equity carries an implicit cost in the form of expected shareholder returns. A financially healthy company actively manages its capital origins to minimize its Weighted Average Cost of Capital (WACC). If a company relies too heavily on expensive short-term debt to fund long-term projects, it signals poor financial planning and risks an impending liquidity crisis.<\/p>\n<h3>Evaluating Leverage and Risk<\/h3>\n<p><a href=\"https:\/\/www.hashmicro.com\/my\/blog\/debt-to-equity-ratio\/\">The ratio of debt to equity<\/a> is a primary indicator of financial risk. A company that sources the vast majority of its operational capital from external debt is highly leveraged. While leverage can amplify profits during economic booms, it also amplifies losses during downturns since fixed interest payments must be met regardless of revenue performance.<\/p>\n<h3>Optimizing Shareholder Value<\/h3>\n<p>Ultimately, the goal of corporate finance is to maximize shareholder value. This requires a delicate balancing act. By carefully balancing debt and equity, a company can optimize its financial leverage and ultimately improve its <a href=\"https:\/\/www.hashmicro.com\/my\/blog\/return-on-equity\/\">return on equity<\/a>, signaling strong financial health to potential shareholders. If a company can borrow money at a 5% interest rate and invest it in a project that yields a 15% return, the origin of those funds (debt) has been successfully utilized to generate significant value for the equity holders.<\/p>\n<h3>Cash Flow Sustainability<\/h3>\n<p>Analysts also examine the <a href=\"https:\/\/www.hashmicro.com\/my\/blog\/cash-flow-management\/\">sustainability of financial origins<\/a>. A company might show a massive influx of cash in a given quarter, making its balance sheet appear very strong. However, if that cash originated from the one-time sale of a primary manufacturing facility (an investing activity) rather than recurring revenue from its core product line (an operating activity), the perceived financial health is an illusion. Sustainable financial health requires the primary source of capital to be the company&#8217;s core, repeatable business operations.<\/p>\n<h2 id=\"technology-role\"><strong>The Role of Technology in Managing and Tracking Funds<\/strong><\/h2>\n<p>In an era of globalized trade, instant cross-border transactions, and increasingly complex regulatory environments, manual tracking of financial origins using spreadsheets and physical filing is no longer viable. The sheer volume and velocity of financial data require sophisticated technological solutions to ensure accuracy, compliance, and strategic agility.<\/p>\n<h3>Enterprise Resource Planning (ERP) Systems<\/h3>\n<p>Modern <a href=\"https:\/\/www.hashmicro.com\/my\/blog\/what-is-erp-software\/\">ERP systems<\/a> serve as the central nervous system of corporate financial tracking. These comprehensive software platforms integrate all facets of a business from procurement and supply chain management to sales and accounting into a single, unified database.<\/p>\n<p>Advanced ERP systems allow organizations to <a href=\"https:\/\/www.hashmicro.com\/my\/blog\/finance-automation\/\">automate the tracking of incoming capital<\/a>, ensuring that every transaction is instantly categorized, matched with its corresponding documentation, and accurately reflected across all financial statements in real time.<\/p>\n<h3>Automated AML and KYC Solutions<\/h3>\n<p>The compliance sector has been transformed by Regulatory Technology (RegTech). Automated KYC platforms utilize Artificial Intelligence (AI) and Machine Learning (ML) to streamline the verification of financial origins. These systems can automatically extract data from uploaded bank statements and tax returns using Optical Character Recognition (OCR), cross-reference corporate entities against global beneficial ownership databases, and screen individuals against international sanctions and PEP lists within seconds.<\/p>\n<p>Furthermore, AI transaction monitoring algorithms establish a baseline of normal financial behavior for each client. They instantly flag incoming funds that deviate from established patterns for example, if a client who typically transfers RM 50,000 per month suddenly wires RM 2 million from an offshore jurisdiction, the system halts the transaction and alerts the compliance team automatically.<\/p>\n<h3>Open Banking and API Integrations<\/h3>\n<p>Open banking is revolutionizing the way institutions verify financial origins. Instead of relying on static PDF bank statements that can be forged, organizations can now use secure API integrations to pull real-time, read-only transaction data directly from the client&#8217;s bank. Consequently, this eliminates document fraud, accelerates the verification process, and provides a historically accurate view of the client&#8217;s financial behavior.<\/p>\n<h2 id=\"industry-specific-applications-of-source-of-funds\"><strong>Industry-Specific Applications of Source of Funds Verification<\/strong><\/h2>\n<p><img decoding=\"async\" class=\"size-full wp-image-17658 aligncenter\" src=\"https:\/\/www.hashmicro.com\/my\/blog\/wp-content\/uploads\/2026\/03\/Industry-Specific-Applications-of-Source-of-Funds-Verification.webp\" alt=\"Industry-Specific Applications of Source of Funds Verification\" width=\"1536\" height=\"1024\" srcset=\"https:\/\/www.hashmicro.com\/my\/blog\/wp-content\/uploads\/2026\/03\/Industry-Specific-Applications-of-Source-of-Funds-Verification.webp 1536w, https:\/\/www.hashmicro.com\/my\/blog\/wp-content\/uploads\/2026\/03\/Industry-Specific-Applications-of-Source-of-Funds-Verification-300x200.webp 300w, https:\/\/www.hashmicro.com\/my\/blog\/wp-content\/uploads\/2026\/03\/Industry-Specific-Applications-of-Source-of-Funds-Verification-1024x683.webp 1024w, https:\/\/www.hashmicro.com\/my\/blog\/wp-content\/uploads\/2026\/03\/Industry-Specific-Applications-of-Source-of-Funds-Verification-768x512.webp 768w, https:\/\/www.hashmicro.com\/my\/blog\/wp-content\/uploads\/2026\/03\/Industry-Specific-Applications-of-Source-of-Funds-Verification-630x420.webp 630w, https:\/\/www.hashmicro.com\/my\/blog\/wp-content\/uploads\/2026\/03\/Industry-Specific-Applications-of-Source-of-Funds-Verification-150x100.webp 150w, https:\/\/www.hashmicro.com\/my\/blog\/wp-content\/uploads\/2026\/03\/Industry-Specific-Applications-of-Source-of-Funds-Verification-696x464.webp 696w, https:\/\/www.hashmicro.com\/my\/blog\/wp-content\/uploads\/2026\/03\/Industry-Specific-Applications-of-Source-of-Funds-Verification-1068x712.webp 1068w\" sizes=\"(max-width: 1536px) 100vw, 1536px\" \/><\/p>\n<p>While the foundational principles of tracking capital origins remain consistent, the practical application varies significantly across different sectors. Each industry faces unique regulatory pressures, transaction volumes, and risk profiles necessitating tailored approaches to verifying where money comes from.<\/p>\n<h3 id=\"real-estate-and-high-value-property\">Real Estate and High-Value Property Transactions<\/h3>\n<p><a href=\"https:\/\/www.hashmicro.com\/my\/blog\/construction-accounting\/\">The real estate sector<\/a> has historically been a prime target for money laundering due to the high value of assets and the ability to obscure ownership through shell companies. In Malaysia, real estate agents and property developers are designated reporting institutions under AMLA. As a result, they are required to conduct rigorous SOF checks before finalizing any transaction scrutinizing the origin of mortgage deposits, cash purchases, and international wire transfers.<\/p>\n<h3 id=\"cryptocurrency-and-digital-assets\">Cryptocurrency Exchanges and Digital Assets<\/h3>\n<p>The rise of decentralized finance (DeFi) and digital assets has introduced unprecedented challenges to financial compliance. Virtual Asset Service Providers (VASPs) and cryptocurrency exchanges must implement stringent SOF protocols to bridge the gap between fiat currencies and digital tokens.<\/p>\n<p>In practice, verifying the origin of capital in this sector involves not only checking traditional bank deposits, but also utilizing blockchain analytics to trace wallet histories and ensure incoming crypto deposits have not passed through sanctioned mixing services or darknet markets.<\/p>\n<h3 id=\"wealth-management-and-legal-services\">Wealth Management and Legal Services<\/h3>\n<p>Law firms, trust providers, and wealth managers handle large sums of client money for escrow accounts, offshore trusts, and corporate acquisitions. These professionals serve as gatekeepers to the financial system.<\/p>\n<p>In Malaysia, legal firms and accountants are classified as Designated Non-Financial Businesses and Professions (DNFBPs) under AMLA. This classification makes SOF verification a binding regulatory obligation not a discretionary practice.<\/p>\n<h2 id=\"establishing-a-robust-sof-framework\"><strong>Establishing a Robust Source of Funds Verification Framework<\/strong><\/h2>\n<p>Effective SOF compliance requires a structured, repeatable framework. A well-designed system balances rigorous regulatory adherence with operational efficiency and a smooth client experience.<\/p>\n<h3 id=\"step-1-tailored-risk-profiling\">Step 1: Tailored Risk Profiling<\/h3>\n<p>establish a risk-based approach from the start. Categorize clients by jurisdiction, transaction size, and relationship type. A domestic retail customer depositing part of their monthly salary requires standard CDD. A PEP transferring a large sum from a high-risk jurisdiction requires immediate enhanced scrutiny.<\/p>\n<h3 id=\"step-2-automated-document-collection\">Step 2: Automated Document Collection<\/h3>\n<p>manual collection causes delays and human error. Implement secure automated portals where clients upload payslips, dividend certificates, or sale contracts. Communicate clearly what constitutes acceptable proof. Reducing back-and-forth friction accelerates the process significantly.<\/p>\n<h3 id=\"step-3-triangulation-and-verification\">Step 3: Triangulation and Verification<\/h3>\n<p>cross-reference collected documents against the client&#8217;s stated occupation, transaction history, and third-party data. Look for logical consistency. If a client claims funds came from a business sale, the dates, amounts, and parties on the sale agreement must match the incoming bank transfers exactly.<\/p>\n<h3 id=\"step-4-clear-escalation-protocols\">Step 4: Clear Escalation Protocols<\/h3>\n<p>define escalation paths before they are needed. When an automated system flags an anomaly or when a compliance officer cannot confidently verify capital origins the case must go to a senior risk committee. Document every decision thoroughly for future regulatory audits.<\/p>\n<h2 id=\"common-pitfalls-in-sof-management\"><strong>Common Pitfalls in Source of Funds Management<\/strong><\/h2>\n<p>Even well-designed frameworks fail in practice. The following pitfalls are the most common causes of regulatory fines, reputational damage, and lost business.<\/p>\n<h3>Treating Compliance as a Tick-Box Exercise<\/h3>\n<p>Many compliance teams collect documents without critically analyzing the narrative behind them. This leaves organizations vulnerable to sophisticated fraud. Forging bank statements and invoices is not difficult for experienced financial criminals. Compliance officers must look beyond the document surface they must assess whether the story makes sense.<\/p>\n<h3 id=\"alienating-legitimate-clients\">Alienating Legitimate Clients with Excessive Friction<\/h3>\n<p>Overly aggressive SOF requests damage legitimate client relationships. Asking for excessive documentation on low-risk transactions frustrates clients. Failing to explain why the information is needed makes it worse. Both outcomes lead to abandoned transactions and customer churn. The right balance between security and a smooth experience remains one of the most persistent operational challenges in compliance.<\/p>\n<h3 id=\"inconsistent-audit-trails\">Inconsistent Audit Trails<\/h3>\n<p>Regulators want to see how an organization reached its compliance decision, not just that a decision was made. A compliance officer who approves a complex transaction based on a phone call, but fails to log that context into the central system, creates an indefensible record. Comprehensive, <a href=\"https:\/\/www.hashmicro.com\/my\/blog\/audit-trail\/\">immutable audit trails<\/a> are not optional they are the evidence that protects the organization during regulatory examination.<\/p>\n<h2 id=\"advanced-practices-and-future-trends\"><strong>Advanced Practices Shaping the Future of SOF Compliance<\/strong><\/h2>\n<p>Financial criminals continuously develop more sophisticated methods to conceal illicit capital. Forward-thinking organizations respond by adopting advanced technologies and practices that stay ahead of these methods.<\/p>\n<h3>Artificial Intelligence and Document Forensics<\/h3>\n<p>Machine learning algorithms detect subtle patterns that indicate money laundering patterns that human analysts routinely miss. AI tools also perform advanced document forensics. They analyze metadata, font consistency, and pixel structures to detect tampered financial documents instantly. In practice, this allows compliance teams to process higher document volumes without sacrificing analytical quality.<\/p>\n<h3>Perpetual KYC (pKYC)<\/h3>\n<p>Traditional SOF checks happen at onboarding or at the point of a major transaction. The industry now moves toward Perpetual KYC (pKYC). This approach continuously monitors a client&#8217;s financial profile in real time. When transactional behavior deviates from the established baseline, the system automatically triggers a dynamic SOF review. Compliance becomes continuous not a series of isolated point-in-time checks.<\/p>\n<h3>Blockchain and Distributed Ledger Technology<\/h3>\n<p>Blockchain records are immutable and decentralized. Financial transactions recorded on a blockchain provide a reliable, tamper-proof audit trail for regulators and compliance officers. As this technology matures, it is expected to play a growing role in cross-border SOF verification particularly for international trade finance and cross-border real estate investment.<\/p>\n<h2><strong>Conclusion<\/strong><\/h2>\n<p>Source of funds verification has evolved from a compliance checkbox into a strategic imperative for Malaysian businesses. As Bank Negara Malaysia continues to tighten its AML\/CFT framework and as Malaysia&#8217;s FATF Mutual Evaluation raises the stakes for all reporting institutions organizations that treat SOF management as a genuine risk function will be far better positioned than those that treat it as a procedural formality.<\/p>\n<p>For accountants, CFOs, and compliance officers, the practical takeaway is clear: build a structured, risk-based SOF framework, invest in technology that automates document collection and verification, and maintain immutable audit trails for every significant transaction. Furthermore, ensure that your team understands the critical distinction between source of funds and source of wealth because regulatory examiners do.<\/p>\n<p>Mastering source of funds management builds trust and long term resilience beyond avoiding fines. <a href=\"https:\/\/www.hashmicro.com\/my\/free-product-demo\/\">Explore a free demo<\/a> to automate your verification process and maintain high compliance without manual delays.<\/p>\n<a href=\"https:\/\/www.hashmicro.com\/my\/free-product-demo\/?medium=free-product-demo\" target=\"_blank\"><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.hashmicro.com\/my\/blog\/wp-content\/uploads\/2025\/08\/free-demo-desktop-my.webp\" data-desktop-src=\"https:\/\/www.hashmicro.com\/my\/blog\/wp-content\/uploads\/2025\/08\/free-demo-desktop-my.webp\" data-mobile-src=\"https:\/\/www.hashmicro.com\/my\/blog\/wp-content\/uploads\/2024\/07\/free-demo-mobile-my.jpg\" alt=\"FreeDemo\" class=\"responsive-image-banner\"><\/a>\r\n\r\n<script>\r\n    \/\/ check which image to use based on screensize\r\n    document.addEventListener(\"DOMContentLoaded\", function() {\r\n        function updateImageSource() {\r\n            var images = document.querySelectorAll('.responsive-image-banner');\r\n            var screenWidth = window.innerWidth;\r\n\r\n            images.forEach(function(img) {\r\n                var mobileSrc = img.getAttribute('data-mobile-src');\r\n                var desktopSrc = img.getAttribute('data-desktop-src');\r\n\r\n                if (screenWidth < 576 && mobileSrc) {\r\n                    img.setAttribute('src', mobileSrc);\r\n                } else {\r\n                    img.setAttribute('src', desktopSrc);\r\n                }\r\n            });\r\n        }\r\n\r\n        \/\/ Initial check\r\n        updateImageSource();\r\n\r\n        \/\/ Update on resize\r\n        window.addEventListener('resize', updateImageSource);\r\n    });\r\n<\/script>\n<h2><strong>FAQ About Source Of Funds<\/strong><\/h2>\n<ul class=\"bottom_faq\">\n<li>\n<details open=\"open\">\n<summary><strong>Is source of funds verification required in Malaysia?<br \/>\n<\/strong><\/summary>\n<p>Yes. Under Malaysia&#8217;s Anti-Money Laundering, Anti-Terrorism Financing and Proceeds of Unlawful Activities Act 2001 (AMLA), all reporting institutions including banks, insurance companies, real estate agencies, legal firms, and accountants are legally obligated to conduct source of funds verification as part of their Customer Due Diligence (CDD) processes. Bank Negara Malaysia supervises compliance and can impose significant penalties for failures.<\/p>\n<\/details>\n<\/li>\n<li>\n<details open=\"open\">\n<summary><strong>What documents are acceptable as proof of source of funds?<\/strong><\/summary>\n<p>For individuals, acceptable documents include bank statements (covering the last 3\u20136 months), recent payslips or tax returns, property sale contracts, investment portfolio statements, and inheritance documents. For corporate entities, acceptable proof includes audited financial statements, corporate tax returns, signed loan agreements, shareholder agreements, and commercial contracts with corresponding invoices.<\/p>\n<\/details>\n<\/li>\n<li>\n<details open=\"open\">\n<summary><strong>What happens if a business fails to verify the source of funds?<\/strong><\/summary>\n<p>Failure to comply with SOF verification requirements in Malaysia can result in severe consequences including regulatory fines, criminal prosecution of executives, revocation of operating licenses, and lasting reputational damage. Under the 2024 AMLA amendment, individual directors and compliance officers can be held personally liable for institutional AML failures.<\/p>\n<\/details>\n<\/li>\n<li>\n<details open=\"open\">\n<summary><strong>What are examples of sources of funds?<\/strong><\/summary>\n<p>Sources of funds are categorized into two primary channels: internal and external. Internally, capital originates from retained earnings, the sale of non core assets, or the aggressive optimization of working capital. Externally, funds are secured through debt financing such as commercial bank loans and corporate bonds, or via equity financing through the issuance of new shares to investors. For individual clients, common examples include accumulated employment income, proceeds from real estate sales, liquidation of investment portfolios, or legally documented inheritance.<\/p>\n<\/details>\n<\/li>\n<li>\n<details open=\"open\">\n<summary><strong>How do financial institutions verify source of funds?<\/strong><\/summary>\n<p>Financial institutions utilize a risk based approach through Customer Due Diligence (CDD) protocols. This involves collecting Proof of Source of Funds (PoSOF) such as bank statements covering 3 to 6 months, audited financial statements, or tax filings submitted to LHDN. Verifiers perform triangulation to ensure the transaction value aligns logically with the client&#8217;s known income profile and historical financial behavior. Modern institutions increasingly deploy RegTech and AI to detect document tampering or suspicious transaction patterns in real time.<\/p>\n<\/details>\n<\/li>\n<\/ul>\n<p><script type=\"application\/ld+json\">\n{\n  \"@context\": \"https:\/\/schema.org\",\n  \"@type\": \"FAQPage\",\n  \"mainEntity\": [{\n    \"@type\": \"Question\",\n    \"name\": \"Is source of funds verification required in Malaysia?\",\n    \"acceptedAnswer\": {\n      \"@type\": \"Answer\",\n      \"text\": \"Yes. Under Malaysia's Anti-Money Laundering, Anti-Terrorism Financing and Proceeds of Unlawful Activities Act 2001 (AMLA), all reporting institutions including banks, insurance companies, real estate agencies, legal firms, and accountants are legally obligated to conduct source of funds verification as part of their Customer Due Diligence (CDD) processes. Bank Negara Malaysia supervises compliance and can impose significant penalties for failures.\"\n    }\n  },{\n    \"@type\": \"Question\",\n    \"name\": \"What documents are acceptable as proof of source of funds?\",\n    \"acceptedAnswer\": {\n      \"@type\": \"Answer\",\n      \"text\": \"For individuals, acceptable documents include bank statements (covering the last 3\u20136 months), recent payslips or tax returns, property sale contracts, investment portfolio statements, and inheritance documents. For corporate entities, acceptable proof includes audited financial statements, corporate tax returns, signed loan agreements, shareholder agreements, and commercial contracts with corresponding invoices.\"\n    }\n  },{\n    \"@type\": \"Question\",\n    \"name\": \"What happens if a business fails to verify the source of funds?\",\n    \"acceptedAnswer\": {\n      \"@type\": \"Answer\",\n      \"text\": \"Failure to comply with SOF verification requirements in Malaysia can result in severe consequences including regulatory fines, criminal prosecution of executives, revocation of operating licenses, and lasting reputational damage. Under the 2024 AMLA amendment, individual directors and compliance officers can be held personally liable for institutional AML failures.\"\n    }\n  },{\n    \"@type\": \"Question\",\n    \"name\": \"What are examples of sources of funds?\",\n    \"acceptedAnswer\": {\n      \"@type\": \"Answer\",\n      \"text\": \"Sources of funds are categorized into two primary channels: internal and external. Internally, capital originates from retained earnings, the sale of non core assets, or the aggressive optimization of working capital. Externally, funds are secured through debt financing such as commercial bank loans and corporate bonds, or via equity financing through the issuance of new shares to investors. For individual clients, common examples include accumulated employment income, proceeds from real estate sales, liquidation of investment portfolios, or legally documented inheritance.\"\n    }\n  },{\n    \"@type\": \"Question\",\n    \"name\": \"How do financial institutions verify source of funds?\",\n    \"acceptedAnswer\": {\n      \"@type\": \"Answer\",\n      \"text\": \"Financial institutions utilize a risk based approach through Customer Due Diligence (CDD) protocols. This involves collecting Proof of Source of Funds (PoSOF) such as bank statements covering 3 to 6 months, audited financial statements, or tax filings submitted to LHDN. Verifiers perform triangulation to ensure the transaction value aligns logically with the client's known income profile and historical financial behavior. Modern institutions increasingly deploy RegTech and AI to detect document tampering or suspicious transaction patterns in real time.\"\n    }\n  }]\n}\n<\/script><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In the complex ecosystem of modern corporate finance and global regulatory compliance, money is the lifeblood that keeps operations running. However, simply having capital is no longer sufficient. Understanding exactly where that capital originates is equally critical and in Malaysia, it is a legal requirement. Malaysian financial institutions submitted approximately 317,435 suspicious transaction reports (STRs) [&hellip;]<\/p>\n","protected":false},"author":39,"featured_media":17631,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[54],"tags":[],"class_list":{"0":"post-17607","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-accounting"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.6 (Yoast SEO v26.6) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Source of Funds: What It Is, Why It Matters &amp; How to Verify It<\/title>\n<meta name=\"description\" content=\"source of funds refers to the specific origin of the money used in a particular transaction or business operation. Read full article now.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.hashmicro.com\/my\/blog\/source-of-funds\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Source of Funds: What It Is, Why It Matters &amp; How to Verify It\" \/>\n<meta property=\"og:description\" content=\"source of funds refers to the specific origin of the money used in a particular transaction or business operation. Read full article now.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.hashmicro.com\/my\/blog\/source-of-funds\/\" \/>\n<meta property=\"og:site_name\" content=\"HashMicro Malaysia\" \/>\n<meta property=\"article:published_time\" content=\"2026-03-13T06:45:57+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-28T04:35:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.hashmicro.com\/my\/blog\/wp-content\/uploads\/2026\/03\/source-of-funds.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Siti binti Rahman\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Siti binti Rahman\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"20 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.hashmicro.com\/my\/blog\/source-of-funds\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.hashmicro.com\/my\/blog\/source-of-funds\/\"},\"author\":{\"name\":\"Siti binti Rahman\",\"@id\":\"https:\/\/www.hashmicro.com\/my\/blog\/#\/schema\/person\/e4dba2ae170a31d8f85bf173ebfbf7a5\"},\"headline\":\"Source of Funds: What It Is, Why It Matters &#038; How to Verify It\",\"datePublished\":\"2026-03-13T06:45:57+00:00\",\"dateModified\":\"2026-04-28T04:35:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.hashmicro.com\/my\/blog\/source-of-funds\/\"},\"wordCount\":4339,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.hashmicro.com\/my\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.hashmicro.com\/my\/blog\/source-of-funds\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.hashmicro.com\/my\/blog\/wp-content\/uploads\/2026\/03\/source-of-funds.webp\",\"articleSection\":[\"Accounting\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.hashmicro.com\/my\/blog\/source-of-funds\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.hashmicro.com\/my\/blog\/source-of-funds\/\",\"url\":\"https:\/\/www.hashmicro.com\/my\/blog\/source-of-funds\/\",\"name\":\"Source of Funds: What It Is, Why It Matters & How to Verify It\",\"isPartOf\":{\"@id\":\"https:\/\/www.hashmicro.com\/my\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.hashmicro.com\/my\/blog\/source-of-funds\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.hashmicro.com\/my\/blog\/source-of-funds\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.hashmicro.com\/my\/blog\/wp-content\/uploads\/2026\/03\/source-of-funds.webp\",\"datePublished\":\"2026-03-13T06:45:57+00:00\",\"dateModified\":\"2026-04-28T04:35:59+00:00\",\"description\":\"source of funds refers to the specific origin of the money used in a particular transaction or business operation. Read full article now.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.hashmicro.com\/my\/blog\/source-of-funds\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.hashmicro.com\/my\/blog\/source-of-funds\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.hashmicro.com\/my\/blog\/source-of-funds\/#primaryimage\",\"url\":\"https:\/\/www.hashmicro.com\/my\/blog\/wp-content\/uploads\/2026\/03\/source-of-funds.webp\",\"contentUrl\":\"https:\/\/www.hashmicro.com\/my\/blog\/wp-content\/uploads\/2026\/03\/source-of-funds.webp\",\"width\":800,\"height\":400,\"caption\":\"source of funds\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.hashmicro.com\/my\/blog\/source-of-funds\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.hashmicro.com\/my\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Source of Funds: What It Is, Why It Matters &#038; How to Verify It\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.hashmicro.com\/my\/blog\/#website\",\"url\":\"https:\/\/www.hashmicro.com\/my\/blog\/\",\"name\":\"HashMicro Malaysia\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.hashmicro.com\/my\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.hashmicro.com\/my\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.hashmicro.com\/my\/blog\/#organization\",\"name\":\"HashMicro Malaysia\",\"url\":\"https:\/\/www.hashmicro.com\/my\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.hashmicro.com\/my\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.hashmicro.com\/my\/blog\/wp-content\/uploads\/2025\/09\/logo.webp\",\"contentUrl\":\"https:\/\/www.hashmicro.com\/my\/blog\/wp-content\/uploads\/2025\/09\/logo.webp\",\"width\":422,\"height\":255,\"caption\":\"HashMicro Malaysia\"},\"image\":{\"@id\":\"https:\/\/www.hashmicro.com\/my\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.hashmicro.com\/my\/blog\/#\/schema\/person\/e4dba2ae170a31d8f85bf173ebfbf7a5\",\"name\":\"Siti binti Rahman\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.hashmicro.com\/my\/blog\/#\/schema\/person\/image\/\",\"url\":\"http:\/\/www.hashmicro.com\/my\/blog\/wp-content\/uploads\/2025\/10\/cropped-Siti-binti-Rahman-MY-1080x1080-BG-cafe-96x96.webp\",\"contentUrl\":\"http:\/\/www.hashmicro.com\/my\/blog\/wp-content\/uploads\/2025\/10\/cropped-Siti-binti-Rahman-MY-1080x1080-BG-cafe-96x96.webp\",\"caption\":\"Siti binti Rahman\"},\"description\":\"Siti binti Rahman specializes in accounting-related topics, crafting articles that simplify complex financial concepts for business owners and finance professionals. Her content includes practical guides on accounting automation, compliance, and financial reporting. Through well-researched and accessible writing, she supports readers in improving their financial management strategies.\",\"url\":\"https:\/\/www.hashmicro.com\/my\/blog\/author\/siti-binti-rahman\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Source of Funds: What It Is, Why It Matters & How to Verify It","description":"source of funds refers to the specific origin of the money used in a particular transaction or business operation. Read full article now.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.hashmicro.com\/my\/blog\/source-of-funds\/","og_locale":"en_US","og_type":"article","og_title":"Source of Funds: What It Is, Why It Matters & How to Verify It","og_description":"source of funds refers to the specific origin of the money used in a particular transaction or business operation. Read full article now.","og_url":"https:\/\/www.hashmicro.com\/my\/blog\/source-of-funds\/","og_site_name":"HashMicro Malaysia","article_published_time":"2026-03-13T06:45:57+00:00","article_modified_time":"2026-04-28T04:35:59+00:00","og_image":[{"width":800,"height":400,"url":"https:\/\/www.hashmicro.com\/my\/blog\/wp-content\/uploads\/2026\/03\/source-of-funds.webp","type":"image\/webp"}],"author":"Siti binti Rahman","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Siti binti Rahman","Est. reading time":"20 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.hashmicro.com\/my\/blog\/source-of-funds\/#article","isPartOf":{"@id":"https:\/\/www.hashmicro.com\/my\/blog\/source-of-funds\/"},"author":{"name":"Siti binti Rahman","@id":"https:\/\/www.hashmicro.com\/my\/blog\/#\/schema\/person\/e4dba2ae170a31d8f85bf173ebfbf7a5"},"headline":"Source of Funds: What It Is, Why It Matters &#038; How to Verify It","datePublished":"2026-03-13T06:45:57+00:00","dateModified":"2026-04-28T04:35:59+00:00","mainEntityOfPage":{"@id":"https:\/\/www.hashmicro.com\/my\/blog\/source-of-funds\/"},"wordCount":4339,"commentCount":0,"publisher":{"@id":"https:\/\/www.hashmicro.com\/my\/blog\/#organization"},"image":{"@id":"https:\/\/www.hashmicro.com\/my\/blog\/source-of-funds\/#primaryimage"},"thumbnailUrl":"https:\/\/www.hashmicro.com\/my\/blog\/wp-content\/uploads\/2026\/03\/source-of-funds.webp","articleSection":["Accounting"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.hashmicro.com\/my\/blog\/source-of-funds\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.hashmicro.com\/my\/blog\/source-of-funds\/","url":"https:\/\/www.hashmicro.com\/my\/blog\/source-of-funds\/","name":"Source of Funds: What It Is, Why It Matters & How to Verify It","isPartOf":{"@id":"https:\/\/www.hashmicro.com\/my\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.hashmicro.com\/my\/blog\/source-of-funds\/#primaryimage"},"image":{"@id":"https:\/\/www.hashmicro.com\/my\/blog\/source-of-funds\/#primaryimage"},"thumbnailUrl":"https:\/\/www.hashmicro.com\/my\/blog\/wp-content\/uploads\/2026\/03\/source-of-funds.webp","datePublished":"2026-03-13T06:45:57+00:00","dateModified":"2026-04-28T04:35:59+00:00","description":"source of funds refers to the specific origin of the money used in a particular transaction or business operation. Read full article now.","breadcrumb":{"@id":"https:\/\/www.hashmicro.com\/my\/blog\/source-of-funds\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.hashmicro.com\/my\/blog\/source-of-funds\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hashmicro.com\/my\/blog\/source-of-funds\/#primaryimage","url":"https:\/\/www.hashmicro.com\/my\/blog\/wp-content\/uploads\/2026\/03\/source-of-funds.webp","contentUrl":"https:\/\/www.hashmicro.com\/my\/blog\/wp-content\/uploads\/2026\/03\/source-of-funds.webp","width":800,"height":400,"caption":"source of funds"},{"@type":"BreadcrumbList","@id":"https:\/\/www.hashmicro.com\/my\/blog\/source-of-funds\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.hashmicro.com\/my\/blog\/"},{"@type":"ListItem","position":2,"name":"Source of Funds: What It Is, Why It Matters &#038; How to Verify It"}]},{"@type":"WebSite","@id":"https:\/\/www.hashmicro.com\/my\/blog\/#website","url":"https:\/\/www.hashmicro.com\/my\/blog\/","name":"HashMicro Malaysia","description":"","publisher":{"@id":"https:\/\/www.hashmicro.com\/my\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.hashmicro.com\/my\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.hashmicro.com\/my\/blog\/#organization","name":"HashMicro Malaysia","url":"https:\/\/www.hashmicro.com\/my\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hashmicro.com\/my\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.hashmicro.com\/my\/blog\/wp-content\/uploads\/2025\/09\/logo.webp","contentUrl":"https:\/\/www.hashmicro.com\/my\/blog\/wp-content\/uploads\/2025\/09\/logo.webp","width":422,"height":255,"caption":"HashMicro Malaysia"},"image":{"@id":"https:\/\/www.hashmicro.com\/my\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.hashmicro.com\/my\/blog\/#\/schema\/person\/e4dba2ae170a31d8f85bf173ebfbf7a5","name":"Siti binti Rahman","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hashmicro.com\/my\/blog\/#\/schema\/person\/image\/","url":"http:\/\/www.hashmicro.com\/my\/blog\/wp-content\/uploads\/2025\/10\/cropped-Siti-binti-Rahman-MY-1080x1080-BG-cafe-96x96.webp","contentUrl":"http:\/\/www.hashmicro.com\/my\/blog\/wp-content\/uploads\/2025\/10\/cropped-Siti-binti-Rahman-MY-1080x1080-BG-cafe-96x96.webp","caption":"Siti binti Rahman"},"description":"Siti binti Rahman specializes in accounting-related topics, crafting articles that simplify complex financial concepts for business owners and finance professionals. Her content includes practical guides on accounting automation, compliance, and financial reporting. Through well-researched and accessible writing, she supports readers in improving their financial management strategies.","url":"https:\/\/www.hashmicro.com\/my\/blog\/author\/siti-binti-rahman\/"}]}},"order_j":"","_links":{"self":[{"href":"https:\/\/www.hashmicro.com\/my\/blog\/wp-json\/wp\/v2\/posts\/17607","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hashmicro.com\/my\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.hashmicro.com\/my\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.hashmicro.com\/my\/blog\/wp-json\/wp\/v2\/users\/39"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hashmicro.com\/my\/blog\/wp-json\/wp\/v2\/comments?post=17607"}],"version-history":[{"count":9,"href":"https:\/\/www.hashmicro.com\/my\/blog\/wp-json\/wp\/v2\/posts\/17607\/revisions"}],"predecessor-version":[{"id":19013,"href":"https:\/\/www.hashmicro.com\/my\/blog\/wp-json\/wp\/v2\/posts\/17607\/revisions\/19013"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.hashmicro.com\/my\/blog\/wp-json\/wp\/v2\/media\/17631"}],"wp:attachment":[{"href":"https:\/\/www.hashmicro.com\/my\/blog\/wp-json\/wp\/v2\/media?parent=17607"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.hashmicro.com\/my\/blog\/wp-json\/wp\/v2\/categories?post=17607"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.hashmicro.com\/my\/blog\/wp-json\/wp\/v2\/tags?post=17607"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}