V2 /1.3.2020
This is our Anti-money laundering (hereinafter referred to as: “AML”) and Counter-terrorist financing (hereinafter referred to as: “CTF”) Policy, which THE MATRIX CLUB LbG, CERBERUS AM LTD applies to its service. GCBIB Asset Management OÜ is Estonian company and must follow European and Estonian rules for detecting and managing financial crime. Our main two internal bylaws include: AML/CTF procedure for providers of a service of exchanging a virtual currency against a fiat currency; AML/CTF procedure for providers of a service of storing a virtual currency (wallet). The procedures are monitored by the compliance officer and his team. The compliance team monitors the compliance of the internal rules and procedures with the relevant laws and compliance of the activity of the Representatives with the procedures established by the Rules.
As per definition from our AML policy we do not work with
Our obligations, as an Estonian Cryptocurrency-FIAT Exchanges, are defined in the Estonian law as Providers of Alternative Means of Payment, licensed as an Estonian Financial Institution by holding a Financial Activity License from the Estonian Financial Intelligence Unit (hereinafter referred to as: “FIU”), which is the Anti Money Laundering authority in Estonia with the ability to grant, revoke and supervise financial activity licenses. The AML requirements and Know your customer (hereinafter referred to as: “KYC”) due diligence measures for the service providers are set forth in the Estonian Money Laundering and Terrorist Financing Act and other legal guidelines given by the Estonian Minister of Finance.
Wider framework is referred to the AMLD5 of EU (https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A32018L0843) that is an integral part of this AML/KYC Procedure.
A cardinal part of the licensing procedure, and a significant FIU consideration for granting licenses is the quality of the Rules of Procedures which according to the Act, must be meticulously drafted by the license applicant. These Rules of Procedure must comply with the Estonian law’s various requirements, which require them, among other things, to include specification of user due diligence measures the company intends to take, assessment of money laundering risk, the manner of the collection and keeping of records, internal control rules, etc.
GCBIB Asset Management OÜ has been issued operating licenses by the Financial Intelligence Unit for:
Given the above, GCBIB Asset Management aims to be fully compliant and transparent especially when it comes to detecting and monitoring financial crimes. GCBIB Asset Management has implemented measures, which protect GCBIB Asset Management from involvement in money laundering or terrorist financing activities (hereinafter: “suspicious transactions”), by:
In order to protect us and our users from the possible financial crimes, GCBIB Asset Management shall:
In the user due diligence process, GCBIB Asset Management shall perform a KYC for every:
During the registration procedure, every user must provide to GCBIB Asset Management with several personal information and documents, which GCBIB Asset Management need to establish a portfolio of the user and access the risk, connected to it.
3.1 Verifying Customer’s Identity Customer identification is a major part of every AML compliance program. In this section we account for all the procedures and measures taken by us to identify and verify the
customer’s identity, to form a reasonable belief that they know the true identity of each customer.
Let’s go through the steps of customer Identification in our AML policy.
3.2 NATURAL PERSON NEEDS TO PROVIDE AT LEAST:
3.3 LEGAL PERSON NEEDS TO PROVIDE AT LEAST:
GCBIB Asset Management makes sure to protect users personal data in accordance with the relevant laws and the Privacy policy.
3.4 Notifying Customers Under customer identification procedures, GCBIB Asset Management adequately notify by e-mail customers when requesting information for identity verification purposes.
3.5 Verifying Information Information verification is based on a “four eyes” principle, with a double layer of human control, as pre-approval by the employees and the confirmation by the manager.
GCBIB Asset Management will control through non documentary means the customer’s email and the mobile provided, via OTP procedure, automatically embedded in our verification software. When this point has been properly checked, GCBIB Asset Management through documentary means control the coherence between the data inserted and the data in the scanned documents. In particular, the passport will be checked by the MRZ system included in our verification software.
3.6 Inability to Verify Customer’s Identity In case of inability to verify Customer’s identification, the procedures in response to situations include GCBIB Asset Management’s refusal to open an account with that customer. In case of an exit sting customer, GCBIB Asset Management may temporarily block or close an account if further attempts at verification fail.
3.7 When the Customer declines to provide information or provides false information In case of discrepancy in informations, or if the customer decline to provide informations, GCBIB Asset Management will refuse to open the account and will notify the customer. If intentionally providing false information, GCBIB Asset Management , according to the nature of the false information in itself, may inform the competent authorities. In any case, the account won’t be opened and Customer will be blacklisted with his mobile number and email.
3.8 Limits and Threshold of Financial Transactions GCBIB Asset Management policy is to prohibit any transaction bigger than 10.000 euro.
At the moment when the annual volume will become bigger than 10.000 euro, further Due Diligence will be requested by GCBIB Asset Management case by case, including but not limited to
The risk is divided to 3 LEVELS:
4.1 NORMAL The risk level is normal, there are no high risk characteristics present.
4.2 HIGH 1 1. User is from high risk country. 2. User is local PEP or a person. associated with a PEP. 3. The legal person’s area of activity is associated with enhanced money-laundering risk. 4. The legal person is situated in a country, which is listed in the list of risk countries. 5. The legal persons activities and liability are insufficiently regulated by law, and the 6. The representative or the Beneficial Owner / Shareholder of a legal person is a local PEP or his / her family member.
4.3 HIGH 2
5.1 RISK BY USERS: Suspicious facts such as but not limited to the: discrepancies in provided id documents, fictitious person, stolen identity, counterfeited id document, post box home address, pervious financial crime record, terrorist record, wanted person, no contact phone number, not valid documents, discrepancies in provided documents for the legal person, etc.
Politically exposed persons such as but not limited to the: prominent public functions:head of state, head of government, minister and deputy or assistant minister; a member of parliament or of a similar legislative body, a member of a governing body of a political party, a member of a supreme court, a member of a court of auditors or of the board of a central bank; an ambassador, a chargé d’affaires and a high-ranking officer in the armed forces; a member of an administrative, management or supervisory body of a state-owned enterprise; a director, deputy director and member of the board or equivalent function of an international organisation, except middle-ranking or more junior officials.
5.2 RISK BY COUNTRIES: Country of residence / nationality is a country with prohibition/restriction on cryptocurrencies such as but not limited to: Afghanistan, Algeria, American Samoa, Bangladesh, Bolivia, China, Democratic Republic Of Congo, Democratic People’s Republic Of Korea (Dprk), Ecuador, Egypt, Ethiopia, Fyr Macedonia, India, Iran, Iraq, Kyrgyzstan, Pakistan, Palestine, Qatar, Saudi Arabia, Syria, Morocco, Nepal, United States Of America, Vanuatu, Vietnam, Zambia.
Resident / Citizen Of The High Risk Countries such as but not limited to: Yemen, Jordan, Kuwait, Lebanon, Libya, Malaysia, Mali, Mauritania, Nigeria, Oman, Somalia, Serbia, Sri Lanka, Sudan, Tunisia, Turkey, Ethnic Groups Of Caucasus Belonging To Russian Federation (Chechens, Etc.), Trinidad & Tobago.
Low Tax Or Tax-free Countries such as but not limited to: United Arab Emirates, Oman, Bahrain, Qatar, Saudi Arabia, Kuwait, Bermuda, Cayman Islands, The Bahamas, Brunei, Vanuatu, Anguilla, Belize, Costa Rica, Guatemala, Panamá, Nicaragua.
5.3 RISK BY TRANSACTIONS GCBIB Asset Management shall inspect any outstanding transaction, which include but is not limited to the: large transactions that do not correspond to user’s source of funds and/or source of wealth, transactions to offshore or shell bank (financial institution that does not have a physical presence in any country), executing payment via non-licensed payment institution, large daily movements of fiat or virtual money, etc.
5.4 DETECTION OF SUSPICIOUS TRANSACTIONS GCBIB Asset Management shall diligently monitor transactions for suspicious activity. Transactions that are unusual will be automatically detected by the system, suspended and carefully reviewed by a human to determine if it appears that they make no apparent sense or appear to be for an unlawful purpose or unblocked.
Implemented internal controls will serve as ongoing monitoring system in order to detect the suspicious activity or transaction. When such suspicious activity is detected, GCBIB Asset Management shall determine whether a filing with any law enforcement authority is necessary. Suspicious activity can include more than just suspected money laundering attempts. Activity may be suspicious, and GCBIB Asset Management may wish to make a filing with a law enforcement authority, even if no money is lost as a result of the transaction.
GCBIB Asset Management shall initially make the decision of whether a transaction is potentially suspicious. Once GCBIB Asset Management has finished the review of the transaction details, he or she will consult with its management to make the decision as to whether the transaction meets the definition of suspicious transaction or activity and whether any filings with law enforcement authorities should be filed. GCBIB Asset Management shall maintain a copy of the filing as well as all backup documentation. The fact that a filing has been made is confidential. No one, other than those involved in the investigation and reporting should be told of its existence. In no event should the parties involved in the suspicious activity be told of the filing. If the AML officer will deem as necessary, GCBIB Asset Management will file the Suspicious Activity Report (SAR).
5.5 Keeping AML-Related Data and Transaction Records GCBIB Asset Management will record the transaction according to the AMLD5. The following are required steps in the record keeping process:
If you have more questions, please contact us at: aml@cerberus.online |