1
Stand with Ukraine and Donate here
logo

AML/CTF Policy

The Anti-Money Laundering, Countering Financing of Terrorism and Know Your Customer Policy (hereinafter - the "AML/CFT Policy") of BIT-HUB.IO is designated to prevent and mitigate possible risks of BIT-HUB.IO being involved in any kind of illegal activity.

Money laundering is defined as:

 

  1. the conversion or transfer of property derived from criminal activity or property obtained instead of such property, knowing that such property is derived from criminal activity or from an act of participation in such activity, for the purpose of concealing or disguising the illicit origin of the property or of assisting any person who is involved in the commission of such an activity to evade the legal consequences of that person’s actions;
  2. the acquisition, possession or use of property derived from criminal activity or property obtained instead of such property, knowing, at the time of receipt, that such property was derived from criminal activity or from an act of participation therein;
  3. the concealment or disguise of the true nature, source, location, disposition, movement, rights with respect to, or ownership of, property derived from criminal activity or property obtained instead of such property, knowing that such property is derived from criminal activity or from an act of participation in such an activity.

Money laundering also means participation in, association to commit, attempts to commit and aiding, abetting, facilitating and counselling the commission of any of the activities referred to above.

Terrorist financing is defined as the financing and supporting of an act of terrorism and commissioning thereof as well as the financing and supporting of travel for the purpose of terrorism.

Both international and local laws and regulations require BIT-HUB.IO to implement effective internal procedures and mechanisms to prevent money laundering, terrorist financing, drug and human trafficking, proliferation of weapons of mass destruction, corruption and bribery and to take action in case of any form of suspicious activity from its Users.

 

AML/CFT Policy covers the following matters

 

● internal controls;

● verification procedures;

● monitoring, risk assessment and risk-based approach;

● AML/CFT program audit.

 

Internal Controls

 

We have designed a structured system of internal controls in order to comply with applicable Anti-Money Laundering, Countering Financing of Terrorism (hereinafter - the "AML/CFT") laws and regulations.

 

Verification Procedures

 

BIT-HUB.IO establishes its own customer verification procedures within the standards of AML/CFT frameworks.

In the process of due diligence and KYC and in order to open an account, person’s identity, information about a person provided and documents submitted have to be verified and checked against sanctions and watch lists, including PEP list. BIT-HUB.IO uses special tools, structured system of verification and check for that.

Regarding legal entities (their owners/shareholders/beneficiaries, etc.), BIT-HUB.IO carries out special enhanced due diligence, KYC, compliance procedures.

BIT-HUB.IO ensures specific enhanced identification, KYC, due diligence, compliance procedure for customers referenced as PEP, whatever their place of residence.

 

In accordance with our policies BIT-HUB.IO does not open accounts and does not process transactions for citizens and residents of countries, where transactions are prohibited by international sanctions or internal law regulations, or countries which based on various criteria selected by BIT-HUB.IO’s Compliance Department. Currently, these countries are: Belarus, Iran, Democratic Republic of Korea (North Korea), Russian Federation, Sudan, Syrian Arab Republic.

 

Monitoring, risk assessment and risk-based approach

 

BIT-HUB.IO carries out customer’s transactions monitoring, risk‐assessment and suspicious activity detection. For that purpose it uses specially developed system, including using a high-performance tools.

BIT-HUB.IO uses risk-based approach to combating/preventing money laundry and/or financing terrorism.

To assist in determining the level of AML/CFT due diligence to be exercised with regard to the customer, a compliance risk profile is calculated first of all on entry into relations (Low, Medium, High), and is then recalculated routinely.

AML/CFT compliance ensures that an ongoing transaction monitoring is conducted to detect transactions which are unusual or suspicious compared to the customer profile.

Determination of the unusual nature of one or more transactions essentially depends on a subjective assessment, in relation to the knowledge of the customer (KYC), their financial behaviour and the transaction counterparty.

If a transaction is inconsistent with a customer’s known personal usual activities or personal habits, this transaction may be considered suspicious. Data and transaction monitoring tools are used to identify unusual/uncommon patterns of customer’s activity. After review and investigation, it is Compliance Officer’s decision whether to file a SAR or not.

Once a SAR is filed with a relevant agency, a copy of filing documentation is maintained. SAR filing is confidential and only the BIT-HUB.IO’s employees involved in the investigation and reporting process will be aware of its existence.

All records are retained for no less than (5) years and are available upon official request by an authorized examiner, regulator, or law enforcement agency.

 

We apply due diligence measures, in particular

 

● upon establishment of a business relationship;

● upon verification of information gathered while applying due diligence measures or in the case of doubts as to the sufficiency or truthfulness of the documents or data gathered earlier while updating the relevant data;

● upon suspicion of money laundering or terrorist financing;

● in some other cases, including in other exact cases prescribed by law and in cases of identifying “red flags” in accordance to internal procedures.

 

Preservation of data

 

We retain the originals or copies of the documents, which serve as the basis for identification and verification of persons, and the documents serving as the basis for the establishment of a business relationship no less than five years after termination of the business relationship.

We retain the documents prepared with regard to a transaction on any data medium and the documents and data serving as the basis for the notification obligations for no less than five years after making the transaction or performing the duty to report.

 

Our monitoring of a business relationship includes, in particular

 

● checking of transactions made in a business relationship in order ensure that the transactions are in concert with our knowledge of the customer, its activities and risk profile;

● regular updating of relevant documents, data or information gathered in the course of application of due diligence measures;

● identifying the source and origin of the funds used in a transaction;

● paying more attention to transactions that a likely to be linked with money laundering or terrorist financing, including to complex, high-value and unusual transactions and transaction patterns that do not have a reasonable or visible economic or lawful purpose or that are not characteristic of the given business specifics;

● paying more attention to the business relationship or transaction whereby the customer (or payment provider, etc. of the customer) is from a high-risk third country or a country or territory specified by law as country or jurisdiction with factor(s) increasing the geographical risk.

 

Last update: 07.02.2024