AML (Anti Money Laundering) Policy
1. INTRODUCTION AND DEFINITIONS
1a. Policy Statement
CryptoForce has implemented a strict policy to proactively prevent and prohibit money laundering as well as any activities that facilitate money laundering or the financing of terrorist or criminal acts. CryptoForce is fully committed to complying with all relevant requirements outlined in UAE AML and CFT law and its implementing regulations.
1b. Definitions
Money laundering refers to engaging in actions aimed at concealing or disguising the true origins of proceeds derived from illegal activities. These actions are intended to make the funds appear legitimate or to transform them into assets with legitimate origins. Typically, money laundering occurs in three stages. Initially, cash obtained through criminal means enters the financial system during the «placement» stage. This involves converting the cash into monetary instruments like money orders or traveler’s checks, or depositing it into financial institution accounts. Subsequently, during the «layering» stage, the funds are transferred or moved between various accounts or financial institutions to further distance them from their criminal source. Finally, in the «integration» stage, the funds are reintroduced into the economy, used to purchase legitimate assets, or utilized to finance other criminal activities or legitimate businesses. While cash deposits in securities accounts are rare, the securities industry has its own unique role in money laundering. It can be exploited to launder funds acquired elsewhere or generate illicit funds through fraudulent activities. Examples of such fraudulent activities include insider trading, market manipulation, Ponzi schemes, cybercrime, and other investment-related fraudulent practices.
Terrorist financing, on the other hand, may not involve proceeds from criminal activities but rather aims to conceal the origin and intended use of funds, which could be for criminal purposes. Unlike traditional criminal organizations, terrorist financiers may obtain funds from legitimate sources. These sources can include foreign government sponsors, business ownership, personal employment, and even charitable donations. While the motivation behind money laundering and terrorist financing may differ, the methods used to fund terrorist operations can be similar or identical to those employed by other criminals to launder money. It is important to note that funding for terrorist attacks does not always require large sums of money, and the associated transactions may not be overly complex.
2. LAWS AND REGULATIONS
CryptoForce comprehensive AML policies, procedures, and internal controls have been meticulously designed to ensure strict adherence to all applicable AML/CFT regulations. CryptoForce is committed to regularly reviewing and updating these policies, procedures, and internal controls to account for any changes in regulations or developments within the business. This proactive approach ensures that the measures remain effective and aligned with the evolving landscape of anti-money laundering practices. The laws and regulations mentioned below are considered in all processes.
- UAE Federal Law No. 20 of 2018: Anti-Money Laundering and Combating the Financing of Terrorism and Financing of Illegal Organizations (AML Law)
- Full compliance with the regulations and guidelines set forth by VARA
- Cabinet Resolution No. 10 of 2019: Implementing Regulations of Federal Law No. 20 of 2018 (AML Regulations)
- UAE Federal Law No. 7 of 2014: Combating Terrorism Crimes
- UAE Federal Penal Law No. 3 of 1987 as amended (Penal Code)
- UAE Federal Penal Procedures Law No. 35 of 1992 as amended (Penal Procedures Law)
- Regulations regarding declaration by travelers entering or leaving the UAE carrying cash and monetary or financial bearer instruments (issued in 2011)
- UAE Federal Law No. 5 of 2012: Combating Cyber Crimes
- UAE Central Bank Regulations Concerning Procedures for Anti-Money Laundering, in particular Circular No. 24/2000 and its amendments by Notices No. 1045/2004 and 2922/2008
3. OBLIGATIONS
- Identify risks related to criminal acts within its business
- Conduct a comprehensive assessment of potential risks associated with criminal activities such as money laundering, terrorist financing, and the proliferation of weapons of mass destruction
- To report unusual or suspicious transactions to the Financial Intelligence Unit (FIU) at the Central Bank of UAE
- To train our staff regularly and ensure that they are educated and updated on policies and procedures
- Consider factors such as customer profiles, transaction volumes, geographic regions, and emerging trends in the cryptocurrency industry
- Conduct different levels of KYC depending on customer type
- Continuously review and assess any identified risks
- Regularly monitor and evaluate the effectiveness of risk management strategies
- Stay updated on evolving risks and regulatory requirements to ensure proactive mitigation measures
- Ensure that the company complies with Virtual Assets Regulatory Authority (VARA) regulations
- Record keeping of customer and transaction data or a minimum of 5 years while ensuring the confidentiality of the data
- Adhering to the las and regulations defined by the Financial Action Task Force (FATF)
- Develop and implement internal controls and policies to effectively manage these risks
- Establish robust internal control frameworks tailored to the specific risks identified
- Define clear policies, procedures, and guidelines that outline the responsibilities and expectations of employees regarding risk management and compliance
- Establish appropriate due diligence requirements
- Design and implement thorough due diligence procedures for customer onboarding and ongoing monitoring
- Include verification of customer identities, source of funds, and beneficial ownership information
- Conduct enhanced due diligence for high-risk customers, such as politically exposed persons (PEPs) or those in jurisdictions with higher AML risks
- Comply with relevant United Nations (UN) directives concerning the suppression of financing terrorism and proliferation of weapons of mass destruction
- Familiarize and align AML practices with applicable UN directives and resolutions
- Implement measures to prevent transactions that may contribute to the financing of terrorism or the proliferation of weapons of mass destruction
- Ensure robust systems and processes are in place to detect and report any suspicious activities related to these risks
4. PROCEDURES
4a. Know Your Customer (KYC)
Our company recognizes the critical importance of implementing different levels of Know Your Customer (KYC) procedures for different customers. By tailoring the KYC process to the specific risk profiles of each customer, we can effectively mitigate potential threats and ensure compliance with regulatory requirements. High-risk customers undergo a more rigorous and detailed KYC assessment, enabling us to identify and address any suspicious activities promptly. At the same time, low-risk customers experience a streamlined process, facilitating a seamless onboarding experience. Additionally, our company implements separate KYC procedures for individual customers and corporate entities, acknowledging the unique requirements and characteristics of each category. This approach allows us to maintain compliance and transparency while catering to the diverse needs of our valued clients.
In the upcoming diagram, we illustrate the rationale guiding our decision-making process to determine the appropriate KYC level when dealing with a Real Person*
* an individual, not a corporate entity
The specifics of each KYC level provided below will provide a comprehensive understanding of our approach. These detailed descriptions will elucidate the varying requirements and scrutiny applied to individual customers, ensuring a robust and effective KYC framework.
Standard KYC — Individual
CryptoForce will establish and verify the identity of any counterparty with or for whom it acts or proposes to act. CryptoForce may update its counterparty identification policies, procedures, systems, and controls, considering its risk assessment related to the counterparty. The following list should be considered as guidance regarding the type of information and evidence that CryptoForce must obtain to establish and verify the identity of a counterparty before conducting any transactions or entering into any business relationships:
- Full name
- Date of birth
- Citizenship
- Current residential address
- Official I.D
- Source of funds
Enhanced KYC- Individual
We employ enhanced KYC measures when the transaction amount exceeds 10,000 USD or when we perceive a higher risk associated with the customer. These precautionary steps enable us to conduct more thorough due diligence, ensuring enhanced security and regulatory compliance.
In this scenario, in addition to the standard KYC procedure, the customer must either provide proof of source of funds, or be willing to receive/send money only through bank transfers (no cash)
Ultimate KYC- Individual
We enforce our highest level of security, referred to as the «Ultimate KYC,» when transactions exceed 100,000 USD or when we identify a significant risk related to the customer. These stringent measures involve thorough due diligence, ensuring robust security and strict compliance with regulatory standards.
In this scenario, in addition to the standard KYC, the customer must provide the following:
- Proof of source of funds (must be certified)
- Proof of address (must be certified)
- Physical ID (original or certified)
In the forthcoming diagram, we outline the reasoning that governs our decision-making process to determine the suitable KYC level for corporate entities.
At our company, we apply consistent KYC levels to both corporate and individual customers. The logic behind the categorization process remains the same for all. However, for corporate customers, we require additional certified documents to verify their identity and legitimacy. This approach ensures a thorough and professional verification process, fostering trust and compliance with regulatory standards for all our valued customers. These additional documents are:
- Certificate of Incorporation
- Certificate of Incumbency
- Memorandum of Articles
- Board Resolution:
- Introducing us to the representative who is dealing with us directly, and
- Confirming that the company is authorized to buy and sell crypto assets