Recommended for review by every user of the Spectrum Change exchange service. In case of disagreement with the provisions of this regulation, it is prohibited to use the services of the site.
1. Terminology
1.1. An online resource is an organization that provides services for the exchange of digital currency assets.
1.2. User / Client - a private or legal person, a party that accepts a number of services offered on the site platform.
1.3. Illegal activities related to digital money include the following concepts:
1.4. Sub-sanctioned person - a user who is under the influence of restrictions or fines imposed by the EU countries, the UN and other organizations or the government to resolve conflict situations.
1.5. PEP is a person of political significance who conducts special activities in the state system. Instructions regarding this person will also be imposed on members of his inner circle (family of relatives).
1.6. The AML policy is an activity aimed at recognizing the illegality of income declarations.
2. General provision
2.1. This regulation was developed on the basis of the law on AML and the provision on sanctions of international order in the framework of their application to resolve domestic situations.
2.2. The code and rules of the policy allow you to define methods for the safe organization of work and conduct of activities.
2.3. The events are aimed at checking and identifying situations related to illegal activities in the field of virtual currency, conducting unusual and non-standard transactions.
2.4. Appropriate action is taken in cases where a client"s activity is classified as suspicious/illegal.
2.5. The regulation is a legal instruction for the employees of the online resource for the sequence of actions when checking suspicious transactions and users.
2.6. Each employee is personally responsible for the compliance of actions in the work with the norms of the legislative order.
3. Terms of communication with the user
3.1. The administration of the online resource in all relations with the client uses the provisions of the regulation.
3.2. Website employees do not conduct business with representatives of individuals.
3.3. Each user agrees and also undertakes to undergo an identification procedure. Identification takes place subject to certain rules.
4. Identification regulation
4.1. The user provides the following information: last name, first name, patronymic.
4.2. Information about citizenship.
4.3. Passport data, including full data specification.
4.4. Detailed information about the date and place of birth.
4.5. Registration data, as well as the current place of residence.
4.6. Various contact information, including postal and electronic addresses, telephone numbers.
4.7. Any contacts for communication.
4.8. Photocard of civil and/or foreign passport, ID-card.
4.9. A photo of a user holding a document that proves their identity.
4.10. A photographic representation of bills for the provision of services by utilities, indicating the actual address of the user. The request is necessary in the case when the identity document does not contain information about the place of residence or registration.
4.11. Driver"s license.
4.12. A direct or indirect affiliation of a PEP person is requested. Any involvement with a person who performs the functions of a PEP must be indicated.
4.13. Other personal information in any volume and format that the online resource classifies as necessary to fully identify the user.
4.14. If the client is a legal entity, then additional documentation will be required to identify it:
5. Possible risks and conditions of cooperation
5.1. In cooperation with the user, the online resource calculates possible risks in relation to the laundering of digital currency and illegal activities related to finance.
5.2. The parameters that are the target for verification are:
5.3. The risks associated with the location are high in the case of transactions in the following territories:
5.3.1. UN and EU sanctioned places.
5.3.2. Countries that do not counteract illegal transactions in the financial sector.
5.3.3. States that are known to conduct illegal currency transactions, invest in terrorism, and countries with a high level of corruption.
5.4. Client-related risks are suspect in the following cases:
5.4.1. The user is a PEP or is directly or indirectly related to a PEP person.
5.4.2. Inclusion in the sub-sanctions list as an unreliable user. This information is tracked and identified.
5.4.3. The person is directly related to actions that are illegal in the financial sector.
5.5. Risks associated with possible transactions are considered significant in the following cases:
5.5.1. Making transactions by a third party.
5.5.2. Unreasonable conclusion of transactions.
5.5.3. Hiding current members from public view.
5.5.4. Receipts of assets from various accounts.
5.5.5. Non-standard receipt of currency.
5.5.6. Transfer of assets having different denominations in each case of transactions.
5.6. Each of these reasons is a possible risk and reason to consider the user unreliable.
5.7. The online resource has the right to refuse cooperation in the following situations:
5.7.1. The user is directly related to states with high risk scores.
5.7.2. The client is under international sanctions received as a result of illegal actions in the financial sector.
5.7.3. With a direct or indirect relationship to the person PEP.
5.7.4. If there is evidence or suspicion of illegal operations by users before. In this case, enhanced measures are taken regarding the verification and identification of the client.
6. Digital risks and their detection
6.1. Digital risks are defined by the following actions:
6.2. In the fight against risks, the employees of the online resource take the following actions:
6.3. In the fight against the risks associated with receiving inaccurate, false, erroneous data from the user, the online resource has the right to require confirmation of personal data through video communication, a real meeting, requesting additional documents to confirm identity.
6.4. In the fight against the risks associated with cyber attacks, the online resource takes the following actions:
6.5. To reduce the likelihood of risks and eliminate them during data processing, the online service has the right to use server fuses and make backups.
6.6. The system is PCI/DSS certified.
7. Due diligence conditions
7.1. The application of due diligence at a comprehensive level is carried out in relation to users with suspicion of conducting illegal transactions that are of a non-standard nature and include complex schemes.
7.2. The set of measures includes:
7.3. Comprehensive verification is expected and carried out before the start of cooperation.
7.4. Identification of the user"s identity is carried out at the initial stage.
7.5. If suspicions are identified, appropriate action is taken immediately.
8. Extended Check Conditions
8.1. Legal verification in an extended format is carried out in the following cases:
8.2. The possibilities of online resources in this case are as follows:
8.2.1. Verification of user information against the register of credit institutions operating in the territory regulated by AML rules. The case is relevant when the client is related to this institution.
8.2.2. Confirmation of authenticity of data by means of electronic delivery of information.
8.2.3. Organization of payment with the participation of credit institutions in a country where AML / KYC policy protocols are in force.
9. PEP test conditions
9.1. A user who is a PEP or who is directly or indirectly related to a PEP person must indicate this in the registration form (there is a mandatory field for verifying information). The information will be checked against shared sources.
10. Conditions for verification of sanctioned persons
10.1. A user who is a person subject to international sanctions is required to enter this information when filling out the registration form. To enter into a business relationship with an online resource, this information will be verified during identification.
11. Verification conditions in case of suspected illegal transactions
11.1. Suspicious factors include:
11.2. To enter into a business relationship with an online resource, the user undergoes a detailed check.
12. Collection, analysis and storage of data
12.1. For 5 years, the online resource can store the following information after the completion of cooperation with the user:
12.2. The collection, analysis and storage of data is carried out within the framework of the privacy policy.
12.3. Additional processing and seizure may be carried out in case of suspicion of illegal activities. Such information is reported to the MLRO (Money Laundering Reporting Officer).