1. Introduction
The services provided by this site may be used for money laundering and financing of terrorism, insider trading, fraud, and illegal arbitrage. Under the influence of international anti-money laundering and counter-terrorism financing ("AML/CFT") laws and regulations, this website will comply with the requirements of laws and regulations. This includes establishing training, processes and systems to identify, manage and mitigate risks. The purpose is to protect the website's reputation, comply with relevant laws and be a good corporate citizen. If any account is found to be involved in any of the above illegal activities, this website will freeze the account and submit it to the system for automatic processing decision. If necessary, report the account immediately to regulatory authorities.
- 1.1 This website guarantees to carefully comply with the laws and regulations related to "Know Your Customer" and anti-money laundering...
- 1.2 The "Know Your Customer and Anti-Money Laundering Policy" of this website is a comprehensive international policy system...
- 1.3 User withdrawals from this website need to pass the security system assessment review...
- 1.4 If a user of this website violates any provision of this statement or violates any provision of relevant laws...
- 1.5 If irreversible errors occur during the process of withdrawing and transferring funds...
2. Introduction
2.1 What is Money Laundering?
Money laundering is the process of hiding or disguising the source of illegally obtained "dirty" funds...
2.2 What is Terrorist Financing?
- Its main purpose is to conceal the ultimate use of funds, not the source of funds.
- It may involve relatively small amounts of money...
- Legitimate funds may also be diverted to finance terrorism.
2.3 What is Suspicion?
Money Laundering and Terrorist Financing ('ML/TF') is sometimes discovered because a member behaves in a suspicious manner...
3. Know Your Customer and Anti-Money Laundering Policy
- 3.1 Promulgate the policy and update it regularly to meet regulations.
- 3.2 Provide guidance and rules for operating this site to staff.
- 3.3 Design internal monitoring and verification procedures.
- 3.4 Conduct due diligence and ongoing monitoring.
- 3.5 Regularly review and check transactions.
- 3.6 Report suspicious transactions to authorities.
- 3.7 Maintain identity documents for 6 years; transaction records for at least 3 months.
4. Identity Information and Verification
4.1 Identity Information
- 4.1.1 For individuals: Name, DOB, nationality, valid ID, photo, contact info.
- 4.1.2 For companies: Business documents, registration, equity structure, authorized persons, etc.
4.2 Confirmation and Verification
- 4.2.1 Provide all pages of identity documents.
- 4.2.2 Provide a photo of yourself holding your ID.
- 4.2.3 Acceptable certifiers can verify document copies.
- 4.2.4 Determine ultimate beneficiaries based on company structure.
- 4.2.5 Additional requests may be made by the site.
5. Transaction Monitoring
- 5.1 The site monitors transaction amount, frequency, source, and destination.
- 5.2 Suspicious transactions are reported to authorities.
6. Suspicious Transaction Report
- 6.1 Employees are trained to identify suspicious transactions.
- 6.2 Suspicions will be reported internally.
- 6.3 Relevant data may be submitted to regulators as required.
7. Record Keeping
- 7.1 Identity and transaction records will be saved.
- 7.2 Data will be retained for at least six years.
8. Confidentiality and Information Security
- 8.1 Appropriate measures are taken to ensure confidentiality and security.
- 8.2 Security measures will be reviewed and updated.
- 8.3 Employees are required to protect your personal information.
9. Other Matters
- 9.1 The policy may be updated as required by law.
- 9.2 Contact customer service with questions.