AML/KYC policy of the ICESATOSHI.com exchange platform

The Anti-Money Laundering (AML) and Know Your Customer (KYC) policies (hereinafter referred to as the “AML/KYC Policy”) are aimed at preventing the legalization of money, reducing the risk associated with the participation of an organization in any illegal activities.

A virtual service, which is an online resource of a complex structure that allows you to exchange virtual currencies of various countries of the world. The ICESATOSHI.com service fully complies with the AML / KYC policy, which does not allow actions for criminal money laundering and the spread of terrorism, excludes participation in illegal operations.

The purpose of the Service is to provide top-level services to its users while simultaneously identifying and eliminating potential dangers associated with the legalization of finances. AML/KYC provisions are an effective tool for stabilizing the operation of the crypto-currency industry, strengthening trust between the interacting parties.

The AML/KYC policy includes the following items:

  • an employee who conducts control and supervision;
  • assessment of potential hazards;
  • identity verification schemes;
  • control over operations.

An employee who supervises and supervises

The company empowers the employee to control and monitor compliance with established requirements. His responsibilities:

  • collect identifying information about users;
  • engage in the development and updating of policy rules within the organization and the sequence of actions for reviewing, submitting and storing the necessary reporting documents, records, as defined in the current rules and standards;
  • monitor ongoing operations, investigate identified deviations from standard activities;
  • implement the practices used to manage records for easy storage and retrieval of documents and files;
  • periodically update the system for assessing possible hazards;
  • at the request of authorized bodies, provide data that complies with regulatory documents and law.

An employee who conducts control and supervision cooperates with special departments working in the field of counteracting money laundering and the spread of banditry, as well as other illegal activities.

Assessment of potential hazards

According to the requirements of the interstate level, the organization adopts a certain mechanism aimed at preventing the legalization of funds and the spread of banditry. Assessment of possible dangers is an integral part of the mechanism, using which the company ensures the comparability of measures aimed at preventing and reducing the consequences of money laundering and identified dangers. In this case, there is a distribution of resources, depending on the degree of their importance: more attention is paid to the greater danger.

Identity verification schemes

The service adheres to the legal order of the country where the company is located. Customers of the service are required to complete a two-step verification process. The first step is to verify the user"s email address. The second step is to verify the user"s identity and address. To implement this operation, according to the AML/KYC Policy, the user must provide:

  1. An identity document containing a series, first and last name, date of birth, photograph. It must be valid, reliable, independent. At the choice of the user can be provided:
  • passport;
  • foreign passport;
  • driver"s license.

An important nuance: documents can be accepted as identification in the case when the information contained in them has a Latin transliteration.

  1. A document confirming the fact of residence at the specified address for the last three months. In this case, the client can choose it from the following list:
  • a certified rental agreement or an extract from a banking institution;
  • electricity/utility bills;
  • tax return;
  • other documents containing the real address where the citizen has been living for the last three months.

An important nuance: documents are accepted as confirming the address if the information indicated in them has a Latin transliteration.

  1. Selfie of the user himself, holding a paper with the inscription "Service" and the date.

The Company will take certain steps to confirm the truth of the data provided by the user. For this purpose, legal methods with double verification of information are used. The company has the right to refuse the service if it suspects the identity of the user.

The company checks the identity of the user continuously, especially if there are suspicions of illegal activity. In this case, the company can legitimately request updated data again.

All personally identifiable information is collected, stored, shared and protected in accordance with the organization"s Privacy Policy.

If the company cannot verify the truth of the information due to its failure to be provided by the user, then it has the right to refuse registration on the site and terminate further cooperation. This includes cases in which the user"s actions may adversely affect the work of the company due to their incompetence or violation of important rules specific to the area of operation, as well as cases in which the person was subjected to sanctions by one of the states of the world.

From time to time, the company may refuse to cooperate with users on the recommendations of the FATF “High Hazard and Other Controlled Jurisdictions” and our program for managing potential hazards. If it is impossible to provide its services, the company will notify you in advance.

Operations control

The company obtains the necessary information about users by verifying their identity and analyzing activities (transactional models). Potential hazards are assessed through data analysis. To this end, a large list of tasks is performed to control the fulfillment of certain requirements, including the collection and processing of information, record keeping, investigation of suspicious transactions, and reporting. System functions:

  1. Constant verification of users, taking into account aggregated transfers regarding specific data points, distribution of internal communications, filling out certain reporting documents, conducting investigations.
  2. Management of all documents.

The AML/KYC policy reserves the right to analyze all information received from users, monitor their operations, therefore, the company"s competence includes:

  • Control of the procedure for transferring a message about suspicious actions of a client to special structures by an employee who complies with the policy of the organization.
  • The ability to require the provision of additional documents in case of suspicion of illegal actions.
  • The right to suspend or temporarily block a user"s transactions if they are suspected of conducting illegal transactions.

This is not the whole list.

Registration on the resource means your agreement to comply with all the requirements of the Policy AML/KYC, no exceptions. Following the Policy AML/KYC is the main part of the conditions under which the company uses the resource. You must before registering for the Service give your consent.

 

 

 

Need to speed up the application process? Use the Telegram bot from the ICESATOSHI service!

Telegram bot