AML & CFT Policies and Procedures

This Policy pertains to our anti-money laundering and countering the financing of terrorism (AML/CFT) policies and procedures. This Policy serves exclusively to provide general information and is not legally binding on us and/or any other person(s) (natural or otherwise) in any manner.

Our Principles and Approach to AML/CFT Efforts


We are dedicated to supporting AML/CFT initiatives. In principle, we are committed to, among other objectives:

  • Exercising due diligence when engaging with our customers and natural persons designated to act on our customers' behalf;
  • Conducting our operations in accordance with high ethical standards, and striving, as far as practicable, to prevent establishing any business relationships that are or may be connected with or may facilitate money laundering or terrorism financing (ML/TF);
  • Providing, to the fullest extent possible, assistance and cooperation with relevant law enforcement authorities to prevent the threat of money-laundering and terrorism-financing.

Our Approach to Risk Assessment and Mitigation


Risk Assessment

We anticipate that the majority of our customers will be individuals.

In this context, we will:

Document and/or collect documentation relating to:

  • The identities of our customers;
  • The countries or jurisdictions from which our customers originate or are located.

Ensure that, to the best of our knowledge, skill and capability, our customers, connected persons of a customer, natural persons designated to act on behalf of a customer, and beneficial owners of a customer will be assessed and screened with assistance from the List of Designated Individuals and Entities which include (but are not limited to) categories such as:

  • As outlined in the Restricted Jurisdiction Policy
  • The UN 1267/1989 Al-Qaida List
  • The UN 1988 Taliban List

Risk Mitigation

If identified, we shall not engage with any persons identified in the List of Designated Individuals and Entities.

Our Approach to New Products, Practices and Technologies


We shall be properly advised regarding identifying and assessing the ML/TF risks that may emerge in relation to:

  • The development of new products and new business practices, including new delivery mechanisms;
  • The utilization of new or developing technologies for both new and pre-existing products.

We shall pay particular attention to any new products and new business practices, including new delivery mechanisms, and new or developing technologies that favor anonymity, such as digital tokens (whether security, payment and/or utility tokens) that facilitate anonymity.

Our Approach to Customer Due Diligence ("CDD")


We do not open, maintain or accept anonymous accounts or accounts under fictitious names.

We do not establish business relations with, or execute transactions for customers when we have reasonable grounds to suspect that the assets or funds of a customer constitute proceeds of drug dealing or criminal conduct. We shall file a Suspicious Transaction Report and provide a copy to the relevant Financial Intelligence Unit for such transactions.

We perform CDD:

  • When we establish business relations with any customer;
  • When we execute any transaction for any customer with whom we have not established business relations;
  • When we effect or receive virtual assets by transfer for any customer with whom we have not established business relations;
  • When we have suspicion of ML/TF;
  • When we have doubts about the veracity or adequacy of any information.

When we suspect that two or more transactions are or may be related, linked or the result of deliberate restructuring of an otherwise single transaction into smaller transactions to evade Prevention of ML/TF measures, we shall treat the transactions as a single transaction and aggregate their values for purposes of complying with Prevention of ML/TF principles.

Identifying Our Customers

We shall identify each of our customers.

To identify our customers, we shall obtain, at minimum:

  • Their full names, including aliases;
  • Their unique identification numbers (such as identity card number, birth certificate number, or passport number);
  • Their registration address;
  • Their dates of birth;
  • Their nationality.

Verifying the Identities of Our Customers

We shall verify the identities of our customers using reliable, independent source data, documents or information.

Ongoing Monitoring

We shall monitor business relations with our customers on an ongoing basis. Throughout the course of business relations with a customer, we shall observe the conduct of the customer's account and scrutinize transactions undertaken to ensure that the transactions are consistent with our knowledge of the customer, its business and risk profile and, where appropriate, the source of funds.

We shall implement our risk mitigation measures where a transaction involves a transfer of virtual assets to or receipt of virtual assets from an entity other than:

  • A financial institution;
  • A financial institution that is subject to and supervised for compliance with AML/CFT requirements consistent with standards established by the FATF.

We shall pay special attention to all complex, unusually large or unusual patterns of transactions undertaken throughout the course of business relations that have no apparent or visible economic or lawful purpose. We shall, to the extent feasible, investigate the background and purpose of such transactions and document our findings with a view to making this information available to relevant authorities should the need arise.

For purposes of ongoing monitoring, we shall establish and implement adequate systems and processes, commensurate with the size and complexity of the payment service provider to:

  • Monitor its business relations with customers;
  • Detect and report suspicious, complex, unusually large or unusual patterns of transactions undertaken throughout the course of business relations.

We shall ensure that the CDD data, documents and information obtained regarding customers, natural persons designated to act on behalf of customers, connected parties of customers and beneficial owners of customers are relevant and kept current by undertaking reviews of existing CDD data, documents and information, particularly for higher risk categories of customers.

We maintain a zero-tolerance policy regarding client activity that may resemble illegal conduct, including but not limited to child exploitation, terrorist financing, money laundering, drug trafficking, as well as the use of crypto assets flagged by analytics systems as related to dark markets, sanctions, stolen coins, ransom or scam. Taking into account identified suspicions regarding clients having connections with these activities, depending on circumstances, we reserve the right to implement the following measures: request documents concerning the essence and meaning of economic transactions with a warning; temporary blocking of an account pending receipt of documents; requests for documents regarding the origin of funds and their sources; permanent account blocking with notification to law enforcement agencies and the relevant regulator.

In such cases, withdrawal of funds from the account is possible only after a positive response from regulatory authorities following a comprehensive investigation of suspicions of illegal activities.

We shall implement these policies and procedures when establishing business relations with a customer and when conducting ongoing due diligence.

Where there is no face-to-face contact, the payment service provider shall perform CDD measures that are at least as stringent as those that would be required if there was face-to-face contact.

Screening

We shall screen a customer, natural persons designated to act on behalf of the customer, connected parties of the customer and beneficial owners of the customer against relevant ML/TF information sources, as well as lists and information provided by the Authority for purposes of determining if there are any ML/TF risks in relation to the customer.

We shall screen these persons:

  • When, or as soon as reasonably practicable after, we establish business relations with a customer;
  • Before we execute any transaction for any customer who has not otherwise established business relations with the payment service provider;
  • Before we effect or receive virtual assets by value transfer for a customer who has not otherwise established business relations with us;
  • On a periodic basis after we establish business relations with our customers;

When there are any changes or updates to:

  • The lists and information provided by the Authority to the payment service provider;
  • The natural persons designated to act on behalf of a customer, connected parties of a customer or beneficial owners.

We shall screen all value transfer originators and value transfer beneficiaries against lists and information provided by the Authority for purposes of determining if there are any ML/TF risks.

We shall document the results of all screening.

Our Approach to Enhanced CDD


Politically Exposed Persons

We shall use all reasonable means to determine if a customer, any natural person designated to act on behalf of a customer, any connected party of the customer or any beneficial owner of the customer is a politically exposed person, or a family member or close associate of a politically exposed person.

We shall, in addition to performing CDD measures, perform at least the following enhanced customer due diligence (eCDD) measures where a customer or any beneficial owner of the customer is determined by us to be a politically exposed person, or a family member or close associate of a politically exposed person:

  • Obtain approval from senior management to establish and continue business relations with the customer;
  • Establish by reasonable means the source of wealth and source of funds of the customer and any beneficial owner of the customer;
  • Conduct, during the course of business relations with the customer, enhanced monitoring of the business relations with the customer.

We shall increase the degree and nature of monitoring for any transactions that appear unusual or suspicious.

Higher Risk Categories

We recognize that circumstances where a customer presents or may present a higher risk for ML/TF include but are not limited to the following:

  • Where a customer or any beneficial owner of the customer is from or in a country or jurisdiction in relation to which the FATF has called for countermeasures, the payment service provider shall treat any business relations with or transactions for any such customer as presenting a higher risk for ML/TF;
  • Where a customer or any beneficial owner of the customer is from or in a country or jurisdiction known to have inadequate AML/CFT measures, as determined by the payment service provider independently or as notified to payment service providers generally by the Authority or other foreign regulatory authorities, the payment service provider shall assess whether any such customer presents a higher risk for ML/TF.

We will perform enhanced CDD for customers who present a higher risk for ML/TF or any customer the Authority notifies to us as presenting higher risk for ML/TF.

Our Approach to Value Transfer


If we are the ordering institution, before effecting a value transfer, we shall:

  • Identify the value transfer originator and take reasonable measures to verify his or its identity (if we have not already done so);
  • Record adequate details of the value transfer including but not limited to the date of the value transfer, the type and value of virtual assets transferred and the value date.

If we are an ordering institution, we shall include in the message or payment instructions that accompanies or relates to the value transfer:

  • The name of the value transfer originator;
  • The value transfer originator's account number (or unique transaction reference number if applicable);
  • The name of the value transfer beneficiary;
  • The value transfer beneficiary's account number (or unique transaction reference number if applicable).

Value Transfers Exceeding a Particular Threshold

For value transfers exceeding a particular threshold and if we are an ordering institution, we shall identify the value transfer originator and verify his or its identity, include in the message or payment instructions that accompanies or relates to the value transfer information and any of the following:

  • The value transfer originator's residential address;
  • The value transfer originator's unique identification number;
  • The date and place of birth, incorporation or registration of the value transfer originator (as may be appropriate).

We shall immediately and securely submit to the beneficiary institution all value transfer originator and value transfer beneficiary information, and shall document all such information. Where we in the capacity as an ordering institution are not able to comply with the requirements, we shall not execute the value transfer.

If we are the beneficiary institution, we shall take reasonable measures to identify value transfers that lack the required value transfer originator or required value transfer beneficiary information.

For value transfers where we as the beneficiary institution pay out transferred virtual assets in cash or cash equivalent to a value transfer beneficiary, we shall identify and verify the identity of the value transfer beneficiary (if the identity has not been previously verified).

We shall always conduct a review prior to executing a value transfer lacking the required value transfer originator or value transfer beneficiary information, and document our follow-up action.

If we are the intermediary institution, we shall retain all information pertaining to a value transfer.

When we as an intermediary institution effect a value transfer to another intermediary institution or beneficiary institution, we shall immediately and securely provide the information accompanying the value transfer to that other intermediary institution or beneficiary institution.

If we are a receiving intermediary institution, we shall keep a record for at least five years of all information received from an ordering institution or another intermediary institution.

We shall take reasonable measures to identify value transfers that lack the required value transfer originator or value transfer beneficiary information during straight-through processing.

Record Keeping


We will maintain proper records as required for a time period of at least 5 years.

Personal Data


We will safeguard the personal data of our customers in the manner prescribed.

Suspicious Transactions Reporting ("STR")


We will inform the relevant authorities and file STR Reports as required by law. We will also maintain all records and transactions relating to all such transactions and STR Reports.

Our Policies on Compliance, Audit and Training


Among other measures, we shall appoint an AML/CFT Compliance Officer at the Management Level, maintain an independent audit function, and take proactive measures in regularly training our employees on AML/CFT matters.

Enterprise-wide Money-Laundering/Terrorism Financing Risk Assessment


We will employ an enterprise-wide money-laundering/terrorism financing risk assessment in 3 phases:

Phase 1: Assessing Inherent Risk

We will assess the inherent risk in relation to our:

  • Customer or entity: We will conduct an assessment in relation to our customers and/or entities with whom we engage;
  • Products or services: We will remain mindful of whom we serve in our virtual assets OTC services;
  • Geographical level: We will not engage with customers from the List of Designated Individuals and Entities.

Phase 2: Assessing Mitigating Control

We will assess our mitigating controls in relation to the aforesaid. Any and/or all customer(s) whom we find suspicious will first be monitored, followed by exercising eCDD.

Phase 3: Assessing Residual Risk

We will assess our residual risks after evaluating our mitigating controls.

Crypto Travel Rule


The crypto travel rule is a regulation that requires customer due diligence every time crypto assets are transferred. Companies can verify the identities of both the sender and receiver in a transaction, enabling them to identify red flags. Depending on established guidelines, a provider can choose to halt suspicious transactions before they are processed. Our company fully complies with these rules and transmits transaction information to financial institutions in accordance with established rules and regulations.

AML/CFT Policy


Orange LTD complies with all legal norms relating to interaction with law enforcement authorities in the countries of its presence, including but not limited to:

  • Complete and comprehensive responses to incoming requests with provision of all necessary information, both under court orders and without court orders, if the legislation does not require a judicial request for information;
  • Blocking of user assets both by court orders and without court orders, if the legislation of the place of presence does not require a judicial request to seize funds;
  • Transfer of property by court order to government authorities or to victims without payment of compensation to users who have violated the laws of the country of presence;
  • Assistance to law enforcement and other authorized bodies in the investigation of crimes related to cryptocurrencies, as well as information support upon requests;
  • Comprehensive assistance in the return of stolen assets to their rightful owners.

In our activities aimed at ensuring the legality of transactions on the blockchain and the safety of users, in addition to the listed FATF recommendations, we utilize Federal Law No. 115-FL "On Countering the Legalization (Laundering) of Illegal Earnings and the Financing of Terrorism," including:

  • Exchange and P2P platform users identification (KYC);
  • Wallets and transactions identification (KYT);
  • Selective identification of the fiat funds' origin (Source of funds);
  • Implementation of procedures, algorithms and policies related to preventing money laundering and financing of terrorism (AML/CFT) and continuous development of such procedures, algorithms and policies;
  • Formation and continuous improvement of security and compliance departments, which are also responsible for identifying and preventing transactions related to criminal activities, as well as assistance in resolving crimes involving transactions on public blockchains;
  • Special admission procedure for PEPs (politically exposed persons) to operations on the exchange and P2P platform.

In order to implement the stated principles, we cooperate with KYC/AML providers authorized to process users' personal data in accordance with the requirements of Federal Law No. 152-FL "On Personal Data". We conduct KYT analytics both independently (using databases and algorithms for identifying wallets and transactions related to criminal activities) and with the involvement of third-party providers of such services.