Anti-Money Laundering Programme: Difference between revisions
No edit summary |
|||
(2 intermediate revisions by 2 users not shown) | |||
Line 6: | Line 6: | ||
* Risk vectors and ML techniques change regularly, so these requirements and limits are regularly updated. | * Risk vectors and ML techniques change regularly, so these requirements and limits are regularly updated. | ||
* Customer activity is monitored in an on-going basis, including detection of accounts being used in a manner inconsistent with previous usage. | * Customer activity is monitored in an on-going basis, including detection of accounts being used in a manner inconsistent with previous usage. | ||
* Suspicious activity is reported internally and onwards to the relevant law enforcement authorities, e.g. by raising [https:// | * Suspicious activity is reported internally and onwards to the relevant law enforcement authorities, e.g. by raising [https://www.fiu.im/ Suspicious Activity Reports] where appropriate. | ||
* Historical information is maintained for appropriate amounts of time in order to identify trends. | * Historical information is maintained for appropriate amounts of time in order to identify trends. | ||
* All relevant employees are trained to understand these requirements. | * All relevant employees are trained to understand these requirements. | ||
Line 12: | Line 12: | ||
==Limits== | ==Limits== | ||
* Customers that we do not [http://en.wikipedia.org/wiki/Know_your_customer 'know'] are only entitled to | * Customers that we do not [http://en.wikipedia.org/wiki/Know_your_customer 'know'] are only entitled to trade small amounts of cryptocurrency. These are below any thresholds that money launderers would consider useful. | ||
* In order to | * In order to trade a slightly increased amount of cryptocurrency, customers are required to register (i.e. confirm their email address) and also confirm a mobile phone number. | ||
* In order to increase that limit further, more extensive ID checks are performed in the form of: | * In order to increase that limit further, more extensive ID checks are performed in the form of: | ||
** ID verification. | ** ID verification. | ||
Line 32: | Line 32: | ||
==Regulations== | ==Regulations== | ||
Systems, as described above, have been implemented that meet the required | Systems, as described above, have been implemented that meet the required Isle of Man AML legislation required of registered entities. The interests of Bittylicious and these regulations are aligned in combating money laundering and terrorist financing. | ||
Isle of Man legislation enacted to combat money laundering includes: | |||
* The Money Laundering | * The Proceeds of Crime Act 2008 (POCA) | ||
* The | * The Anti-Money Laundering and Countering the Financing of Terrorism Code 2019 (AML/CFT, "the Code") | ||
* The Terrorism Act | * The Designated Businesses (Registration and Oversight) Act 2015 (DBROA) | ||
* The Terrorism and Other Crime (Financial Restrictions) Act 2014 | |||
* The Anti-Terrorism and Crime Act 2003 (ATCA) | |||
Bittylicious also follows AML guidance provided | Bittylicious also follows AML guidance provided in the Isle of Man and in other jurisdictions, notably in the UK, and advice from international organisations, including (but not restricted to): | ||
* the Isle of Man Financial Services Authority (FSA) | |||
* the Isle of Man National Risk Assessments (NRA) | |||
* the Joint Money Laundering Steering Group (JMLSG) | * the Joint Money Laundering Steering Group (JMLSG) | ||
* the Financial Conduct Authority (FCA, UK) | * the Financial Conduct Authority (FCA, UK) | ||
* HM Treasury(UK) | * HM Treasury (UK) | ||
* the Financial Action Task Force (FATF) | * the Financial Action Task Force (FATF) |
Latest revision as of 16:58, 1 January 2021
Principles
- Anti-Money Laundering is at the core of Bittylicious. This includes Bittylicious having adequate systems and control in place to mitigate the risk of Bittylicious being used to facilitate the laundering of the proceeds of crime.
- Senior management is responsible for the oversight of compliance with relevant legislation, regulations, rules and industry guidance.
- The verification requirements and limits are regularly updated after following a Risk Based Approach towards assessing and managing the fraud, money laundering and terrorist financing risks to the company.
- Risk vectors and ML techniques change regularly, so these requirements and limits are regularly updated.
- Customer activity is monitored in an on-going basis, including detection of accounts being used in a manner inconsistent with previous usage.
- Suspicious activity is reported internally and onwards to the relevant law enforcement authorities, e.g. by raising Suspicious Activity Reports where appropriate.
- Historical information is maintained for appropriate amounts of time in order to identify trends.
- All relevant employees are trained to understand these requirements.
Limits
- Customers that we do not 'know' are only entitled to trade small amounts of cryptocurrency. These are below any thresholds that money launderers would consider useful.
- In order to trade a slightly increased amount of cryptocurrency, customers are required to register (i.e. confirm their email address) and also confirm a mobile phone number.
- In order to increase that limit further, more extensive ID checks are performed in the form of:
- ID verification.
- Proof of address verification.
- Bank account verification.
- The limit can be raised further, but in all instances, we open up dialogue with you to understand the reasoning for wanting cryptocurrency, and cross check this where possible.
Enhanced due diligence is additionally performed on any customers that present a higher risk, for example, Politically Exposed Persons (PEPs).
Anti-Abuse
We take active steps to stop users from abusing the limits we set. Amongst other things, we:
- Set strict time limits between starting and completing trades.
- Restrict the number and amount of trades per IP address and IP block.
- Cross-reference information received from banks concerning account names.
Regulations
Systems, as described above, have been implemented that meet the required Isle of Man AML legislation required of registered entities. The interests of Bittylicious and these regulations are aligned in combating money laundering and terrorist financing.
Isle of Man legislation enacted to combat money laundering includes:
- The Proceeds of Crime Act 2008 (POCA)
- The Anti-Money Laundering and Countering the Financing of Terrorism Code 2019 (AML/CFT, "the Code")
- The Designated Businesses (Registration and Oversight) Act 2015 (DBROA)
- The Terrorism and Other Crime (Financial Restrictions) Act 2014
- The Anti-Terrorism and Crime Act 2003 (ATCA)
Bittylicious also follows AML guidance provided in the Isle of Man and in other jurisdictions, notably in the UK, and advice from international organisations, including (but not restricted to):
- the Isle of Man Financial Services Authority (FSA)
- the Isle of Man National Risk Assessments (NRA)
- the Joint Money Laundering Steering Group (JMLSG)
- the Financial Conduct Authority (FCA, UK)
- HM Treasury (UK)
- the Financial Action Task Force (FATF)