Last updated: February 04, 2022
TRANSFEROP PAYMENT GATEWAY LTD. (hereinafter, the “Company”, “We”) and its employees hereby establish internal procedures to prevent the use of our Company services for money laundering (ML) and terrorist financing (TF).
This AML/CTF Policy is provided in compliance with the Proceeds of Crime (Money Laundering) and Terrorist Financing Act (hereinafter, PCMLTFA) and associated Regulations.
Also, we adhere to FATF Recommendations “Guidance on the Risk-Based Approach to Combating Money Laundering and Terrorist Financing”.
In addition, where necessary, we shall refer to the Financial Transactions and Reports Analysis Centre of Canada (hereafter “FINTRAC”).
ML & TF have been identified as major threats to the international financial services community. The industry guidance and rules adopted form the cornerstone of AML/CTF obligations for our Company and outline the offences and penalties for failing to comply.
This Policy applies to all employees of the Company and sets out the procedures which must be followed (for example the reporting of any suspicions of money laundering activity) to enable the Company to comply with its legal obligations. Not all staff will need a detailed knowledge of the types of criminal offences covered by the legislation. However, some staff will require additional guidance to raise their awareness of the possibility of money laundering. Failure by any member of staff to comply with these procedures may lead to disciplinary action being taken against them. Our AML/CTF compliance officer will, as appropriate, receive disclosures from employees of money laundering activity.
The Company aims to fully comply with the financial services industry standards for Know Your Customer (KYC), AML and CTF.
Our Company will actively prevent and take measures to guard against being used for money laundering and terrorism financing activities and any other activity that facilitates money laundering or the funding of terrorist or criminal activities.
This Policy shall regulate the principles and rules of carrying out financial monitoring for the purpose of facilitating the prevention of illicit income legalization and terrorism financing by the Company, specifically, the terms and procedure for identifying the clients and other relevant persons, and receiving, systemizing, processing and retaining the appropriate information, and reporting the suspicious transactions information to the Suspicious Transaction Reporting Office (the “STRO”).
The Company is committed to the AML/CTF procedures as envisaged further herein.
AML - Anti-Money Laundering
CDD - Customer Due Diligence
EFT - Electronic funds transfer
PCMLTFA - Proceeds of Crime (Money Laundering) and Terrorist Financing Act
CTF - Counter-Terrorist Financing
ECDD - Enhanced Customer Due Diligence
HIO - Heads of international organizations
FATF - Financial Action Task Force
FINTRAC - Financial Transactions and Reports Analysis Centre of Canada
ML - Money Laundering
PEPs - Politically Exposed Persons
STR - Suspicious Transaction Reports
SCDD - Simplified Customer Due Diligence
STRO - Suspicious Transaction Reporting Office
TF - Terrorism Financing
TPR - Terrorist Property Report
UNSCR - United Nations Security Council Resolutions
Our AML policies, procedures and internal controls are designed to ensure compliance with applicable regulatory and legislation framework and will be reviewed and updated on a regular basis to ensure appropriate policies, procedures and internal controls are in place to account for both changes in regulations and changes in our business, where applicable.
The Company is guided by requirements and principles of AML law and regulatory resources, including such key guidance as follows:
Money Laundering is the process of moving illegally acquired cash through financial systems so that it appears to come from a legitimate source. Criminals will try to conceal the origin and true ownership of the proceeds of their activities in order to legalise the ill-gained money. It is therefore important that businesses have procedures and policies in place to identify and prevent ML within the Company. Money laundering offence means an offence under subsection 462.31(1) of the Criminal Code of Canada: Every one commits an offence who uses, transfers the possession of, sends or delivers to any person or place, transports, transmits, alters, disposes of or otherwise deals with, in any manner and by any means, any property or any proceeds of any property with intent to conceal or convert that property or those proceeds, knowing or believing that, or being reckless as to whether, all or a part of that property or of those proceeds was obtained or derived directly or indirectly as a result of the commission in Canada of a designated offence; or an act or omission anywhere that, if it had occurred in Canada, would have constituted a designated offence.
The three main stages of ML process cover as follows:
To try and hide the source of the proceeds of crime, criminals carry out transactions, which can be complex and numerous.
As to the terrorism financing, terrorists require funds to support their activity in order to carry out terrorist attacks and, therefore, to provide such funds to terrorists for that purposes means to fulfil TF.
ML & TF may not involve the proceeds of criminal conduct (such as, e.g. drug trafficking, fraud, kidnapping, robbery, etc.), but rather an attempt to conceal either the origin of the funds or their intended use, which could be for criminal purposes. There can also be legitimate sources of funds that are a key difference between terrorist financiers and traditional criminal organizations. In addition to charitable donations, legitimate sources include foreign government sponsors, business ownership and personal employment. Although the motivation differs between traditional money launderers and terrorist financiers, the actual methods used to fund terrorist operations can be the same as or similar to methods used by other criminals to launder funds. Funding for terrorist attacks does not always require large sums of money and the associated transactions may not be complex.
To prevent ML/TF, our Company assesses our customers, their data, their transactions amounts and features, including but not limited to the following:
The Company fully acknowledges that being involved in any of these three stages is potentially a criminal activity that should be treated as appropriate under the applicable legislation provisions and requirements.
As in general envisaged by our internal governance and controls measures laid down in the “Internal Controls Policy”, our Company will also apply in particular the so-called 3 lines of defence model in identifying the functions in addressing and managing our ML/TF risks:
For that purpose, our Company will introduce appropriate processes and controls in place that aim to ensure that ML/TF risks are identified, analysed, measured, monitored, managed, reported and kept within the limits of the Company’s risk appetite and that the business activities are in compliance with external and internal requirements.
The risk management function will facilitate the implementation of a sound ML/TF risk control framework of the Company and is aimed at identifying, monitoring, analysing, measuring, managing and reporting on ML/TF risks and forming a holistic view on all risks on an individual and consolidated basis. It contributes to the implementation of ML/TF risk management measures by the Company’s business lines in order to ensure and underpin that business processes and controls in place at the first line of defence are properly designed and effective.
The compliance function will monitor compliance with legal and regulatory requirements and internal corporate policies, as well as provide advice on compliance to the Board and other relevant staff, and establish policies and processes to manage compliance risks and to ensure compliance (e.g., with other support functions, such as operations, human resources, technology, etc. that work together with the compliance function to identify ML/TF risks when they process transactions, applications, deploy systems or technology, etc.)
Where necessary, both functions may intervene to ensure the modification of ML/TF internal controls and risk management systems within the first line of defence.
The independent internal audit function conducts risk-based and general audits and reviews the internal AML/CTF governance arrangements, AML/CTF processes and mechanisms to ascertain that they are sound and effective, implemented and consistently applied. This function will cover the adequacy and effectiveness of the Company’s AML/CTF policy, procedures and controls in identifying ML/TF risks and addressing them, as well as effectiveness in training of AML/CTF relevant staff.
The internal audit function is in charge also of the independent review of the first two lines of defence, mentioned above. The internal audit function performs its tasks fully independently of the other lines of defence.
The Company’s internal control functions, for the purpose of proper running, will be organised in a manner that provides the independence of these functions within the Company, the appropriate financial and human resources to perform the tasks, and direct reporting to the Board.
Within all three lines of defence, appropriate AML/CTF internal control procedures, mechanisms and processes will be designed, developed, maintained and evaluated under the ultimate responsibility of the Board.
The Company is committed to the AML/CTF procedures including but not limited to, as follows:
Risk assessment should consist of 2 distinct but related steps:
The Company will identify and assess the ML/TF risks:
In accordance with the FATF Recommendations, the Company divided the risks by HIGH, MEDIUM, LOW risk categories and classified the customers by appropriate risk criteria.
ML and TF risks can be assessed within various categories framework.
The Company applies such risk criteria in respect of the customer as:
When initiating the relationships:
When initiating the relationships:
Upon established relationships (existing customer):
When initiating the product/service/ delivery channels:
Understanding the Nature and Purpose of Customer Relationships
We will understand the nature and purpose of customer relationships for the purpose of developing a customer risk profile, which depending on the facts and circumstances, includes such information as:
The Company keeps records of the purpose and intended nature of the business relationship with clients.
During ML/TF risks identification we will:
The Company will identify and assess the ML/TF risks associated with both the customer (as detailed above) and on an enterprise-wide level, including products/services and delivery channels. The enterprise-wide ML/TF risk assessment will enable us to better understand the Company’s overall vulnerability to ML/TF risks and will form the basis for the Company’s overall risk-based approach.
When assessing enterprise-wide ML/TF risks, we will take a holistic view of the ML/TF risk factors we have identified that, together, will determine the level of ML/TF risk associated with a business relationship or occasional transaction, that can enable us to mitigate and manage the identified and assessed risk. Thus, the Company will take into account and will be based on the following:
To effectively mitigate the identified and assessed risks, the Company developed policies, procedures and controls approved by the director.
The Company will:
If the Company intends to carry out a new development or introduce a new technology that may have an impact on its clients, business relationships, products, services or delivery channels or the geographic location of its activities, the Company will assess and document the risk referred to in before doing so.
Record-keeping and Reviews
To keep our enterprise-wide risk assessments updated, we will review our risk assessment at least once every two years or when material trigger events occur, whichever is earlier. Material trigger events can include (without limitation): the acquisition of new customer segments or delivery channels, the launch of new products/services by our Company, etc. For the Company’s record-keeping, the results of these reviews will be documented and approved by our senior management even if there are no significant changes to our enterprise-wide risk assessment.
Where appropriate, we should take these prevailing crime type results into account as part of an ongoing monitoring of the conduct of our customers' accounts and scrutiny of transactions.
These prevailing crime types are as follows:
Additional risk factors that signal possible ML/TF include, but are not limited to:
When we will implement new technology in our business, we will assess the associated ML/TF risks and document and will implement appropriate controls to mitigate those risks.
1. It is forbidden to send or receive payments as consideration for the sale or supply of:
tobacco products, prescription drugs, drugs and drug paraphernalia, weapons (including without limitation, knives, guns, firearms or ammunition), satellite and cable TV descramblers, pornography, adult material, material which incites violence, hatred, racism or which is considered obscene, government IDs and licences including replicas and novelty items and any counterfeit products, unlicensed gambling services (including without limitation the use of or participation in illegal gambling houses), unregistered charity services, items which encourage or facilitate illegal activities, prepaid debit cards or other stored value cards that are not associated with a particular merchant and are not limited to purchases of particular products or services, third party processing or payment aggregation products or services, multi-level marketing, pyramid selling or ponzi schemes, offshore banking, matrix programmes or other “get rich quick” schemes or high yield investment programmes, goods or services that infringe the intellectual property rights of a third party, un-coded/miscoded gaming, timeshares or property reservation payments.
2. It is forbidden to make payments to or receive payments from persons or entities offering illegal gambling services, including (but not limited to) illegal sports betting, casino games and poker games. The company may suspend or terminate the customer’s account at any time or refuse to execute or reverse a transaction if it believes that the customer directly or indirectly uses or has used his account for or in connection with illegal gambling transactions.
3. The customer may not use our services if he is residing in certain countries. These countries will be listed on the Company website and updated from time to time.
This list is not exhaustive and we may in our sole discretion decide to discontinue or restrict our services in other countries at any time and without prior notice. We reserve the right to suspend or terminate the customer’s account at any time if we reasonably believe to be required to do so by law or in order to comply with recommendations issued by a relevant government or competent authority, or recognised body for the prevention of financial crime.
4. The customer is forbidden to use his account for any illegal purposes including but not limited to fraud and any financial crime.
We will report any suspicious activity to the competent authority.
The client is prohibited from using his/her account in an attempt to abuse, exploit or circumvent the usage restrictions imposed by us on the services we provide.
The Company will perform the CDD measures when:
Where there are indications that the risks may have increased over time, the Company should request additional information and conduct a review of the customer’s risk profile in order to determine if additional measures are necessary.
The risk indicators may be as follows:
Two or more transactions may be related or linked if they involve the same sender or recipient. Therefore, where the Company suspects that two or more transactions are or may be related, linked or the result of a deliberate restructuring of an otherwise single transaction into smaller transactions with the intention of circumventing applicable thresholds set out herein and in order to evade the CDD measures, the the Company will treat such transactions as a single transaction and aggregate their values.
We will also make further enquiries when a customer performs frequent and cumulatively large transactions without any apparent of visible economic or lawful purpose (e.g., multiple money transfers over a short period of time when several not substantial money transfers can form the total substantial amount). To determine the linked transactions the company will also use The 24-hour rule, which is the requirement to aggregate multiple transactions when they total $10,000 or more within a consecutive 24-hour window and the transactions are:
The Company has established Know-Your-Client (KYC) procedures to ensure that the identities of all new and existing clients are checked and verified to a reasonable level of certainty. This will include all individual clients, all directors and shareholders with a stake holding of 25% or more of client companies, all partners of client partnerships, and every board member of the client. Identities will be verified online using reasonable measures.
The following documentation should be presented by an individual / natural person:
The following information shall be obtained through the standard identification process:
The following documentation should be presented by a legal person:
The following information shall be obtained through the standard identification process:
Organizational formation provided for in the legislation not representing a legal entity (where applicable):
Regarding legal arrangements, the Company will perform CDD measures on the customer by identifying the settlors, trustees, the protector (if any), the beneficiaries and any natural person exercising ultimate ownership, ultimate control or ultimate effective control over the trust (including through a chain of control or ownership).
Where applicable, if the customer is unable to provide an original document, the Company will obtain a copy of the document as follows:
Also, where a document is in a foreign language it can be accepted with translation into English by a suitably qualified translator.
We will verify the identity of the customer using reliable, independent source data, documents or information. Where the customer is a legal person or legal arrangement, we will verify the legal form, proof of existence, M&AA/constitution and powers that regulate and bind the customer, using reliable, independent source data, documents or information.
Where a customer appoints one or more natural persons to act on his/her behalf in establishing business relations with us, we will identify each such natural person, complying with the requirements of a third party to determine. To verify the due authority of each natural person appointed to act on behalf of the customer, we will be obtaining the following (including, but not limited to):
Where the customer is not a natural person but a legal entity, we will verify that entity and screen the natural person(s) of that entity who act on its behalf.
Where applicable, if the customer is departments, agencies, crown corporations and special operating agencies of Government of Canada (hereinafter, Government entity), the Company shall only be required to obtain such information as may be required to confirm that the customer is a Government entity as asserted.
Based on the risk, and to the extent reasonable and practicable, we will ensure that we have a reasonable belief that we know the true identity of our customers by using risk-based procedures to verify and document the accuracy of the information we get about our customers.
Our AML/CTF compliance officer will analyze the information we obtain to determine whether the information is sufficient to form a reasonable belief that we know the true identity of the customer, e.g., whether the information is logical or contains inconsistencies.
We will verify customer identity through documentary means and/or non-documentary means.
We will use documents to verify customer identity when appropriate documents are available. In light of the increased instances of identity fraud, we will supplement the use of documentary evidence by using the non-documentary means described above whenever necessary.
We may also use non-documentary means, if we are still uncertain about whether we know the true identity of the customer. In verifying the information, we will consider whether the identifying information that we receive, such as the customer’s name, street address, zip code, telephone number (where provided), date of birth and National Insurance number, allow us to determine that we have a reasonable belief that we know the true identity of the customer, e.g., whether the information is logical or contains inconsistencies.
We understand that we are not required to take steps to determine whether the document that the customer has provided to us for identity verification has been validly issued and that we may rely on a government-issued identification as verification of a customer’s identity.
If, however, we note that the document shows some obvious form of fraud, we must consider that factor in determining whether we can form a reasonable belief that we know the customer’s true identity.
In cases where we will deem so necessary or appropriate, we will also use non-documentary methods of verifying identity, as follows:
We will use non-documentary methods of verification when:
We will verify the information within a reasonable time before and after (as may be appropriate) the account is opened.
Depending on the nature of the account and requested transactions, we may refuse to complete a transaction before we have verified the information, or in some instances when we need more time, we may, pending verification, restrict the types of transactions or amounts of transactions. If we find suspicious information that indicates possible ML / TF activity, or other suspicious activity, we will, after internal consultation with the AML/CTF compliance officer of our Company, file a STR, where applicable in accordance with the laws and regulations.
We recognize that the risk that we may not know the customer’s true identity may be heightened for certain types of accounts (e.g., an account opened in the name of a company that is created or conducts substantial business in a jurisdiction that has been designated by the government and/or competent authorities as a primary money laundering jurisdiction, a terrorist concern, or has been designated as a non-cooperative country or territory). We will identify customers that pose a heightened risk of not being properly identified.
We will also take the following additional measures that may be used to obtain information about the identity of the individuals associated with the customer when standard documentary methods prove to be insufficient:
Our Company will also carry out other measures and/or obtain additional information to ensure that the risk identified is effectively managed, including, by determining the expected type and size of future transactions (operations).
The Company shall identify the beneficial owner of the client, as well as undertake reasonable measures to verify his/her identity by means of reliable, independent source and be satisfied that it knows who the beneficial owner of the client is. Identification procedures similar to those used for natural persons shall be applied against beneficial owner.
In the course of the identification and/or verification of a customer and its beneficial owner(s), where applicable, the Company does not rely on a third party/intermediary.
However, we may take into account the performance by another financial institution, including an affiliate, with respect to any customer that is opening an account or has established an account or similar business relationship with the other financial institution to provide or engage in services, dealings or other financial transactions, e.g. when this is reasonable and/or applicable under the circumstances.
At the time of opening an account for a legal entity customer, we will identify any individual that is a beneficial owner of the legal entity customer by identifying any individuals who directly or indirectly own 25% or more of the equity interests of the legal entity customer, and any individual with significant responsibility to control, manage, or direct a legal entity customer. Alongside with the standard CDD procedure for an individual/physical person, the following information will be collected for each beneficial owner:
For verification, we will describe any document relied on (noting the type, any identification number, place of issuance and, if any, date of issuance and expiration). We will also describe any non-documentary methods and the results of any measures undertaken.
The Company will complete verification of the identity of a customer, natural persons appointed to act on behalf of the customer and beneficial owners of the customer before:
If a customer refuses to provide the information or appears to have intentionally provided misleading information, or when we cannot form a reasonable belief that we know the true identity of a customer and completed the CDD, we will do the following:
Our Company will conduct ongoing monitoring (on an ongoing basis) of business relationships with customers, to ensure that the documents, data or information held evidencing the customer’s identity are kept up to date and transactions activity is carried out within the initially declared activity and pursuant to the Company rules and procedures. To this end, the Company will pay special attention to all complex, unusually large or unusual patterns of transactions, undertaken throughout the course of business relations, that have no apparent or visible economic or lawful purpose.
Therefore, ongoing monitoring should take into account a risk-based approach in the following assessment:
The following are examples of changes in a client’s situation that may be considered suspicious:
Whenever there is cause for suspicion, the client will be asked to identify and verify the source or destination of the transactions, whether they be individuals or company beneficial owners.
Other forms of identity confirmation, such as evidence of a long standing relationship with the client, or a letter of assurance from independent and reliable persons or organisations, who have dealt with the client for some time, may also provide a reasonable level of certainty.
Where there are any reasonable grounds for suspicion that existing business relations with a customer are connected with ML or TF, and where the Company considers it appropriate to retain the customer, (i) the Company shall substantiate and document the reasons for retaining the customer; and (ii) the customer’s business relations with the Company shall be subject to commensurate risk mitigation measures, including enhanced ongoing monitoring and enhanced CDD measures, which shall include obtaining the approval of the Company’s director/senior management to retain the customer.
For the record-keeping purposes, the Company will document its findings with a view to having its own records, as well as making this information available to the relevant authorities (should the need arise).
Due to the customer's activity (large amounts, splitting of amounts, frequency of transactions, unusual operations, destination of transactions, final recipient, the actual activity is not commensurate with the declared activity, etc.), specially developed triggers should be triggered/activated. When a trigger is triggered/activated, the client’s risk and fraud level increases automatically. This applies to all customers without exception.
The client base of the Company is under ongoing monitoring, from time to time it is completely checked by the relevant Sanctions / PEP databases and reviewed appropriately.
We will also check the Google search for the name and surname of the customer, as well as in his/her country for the presence of possible negative information about the potential customer.
Examples of negative information: criminal history, involvement in the arms trade, drug trafficking, participation in hostilities as part of illegal armed groups etc., as well as any other illicit activities that are prohibited/restricted in accordance with our internal established policies.
We will check the customer documents for validity in databases to check if any of the triggers are activated, the information correlates, or there are any other doubts on the data accuracy and correctness, to be analysed and dealt for our further procedures.
Triggers of Data Inconsistency:
Also, the Company will resort to using the fraud prevention tools as follows:
MaxMind system - MaxMind fraud tool which allows and looks at parameters such as Overview of transactions, RiskScore, Device tracking, Inputs and Outputs of transaction, Custom Rules, Custom Inputs, Service comparison & Fraud factors such as identity patterns of fraud transactions specific to the business in all type of amount and use subscore to define rules and disposition transaction, or as part of internal risk modelling.
Also, the system will be integrated with Geolocation, which will look at such features as sanctions and high-risk countries and cities. Each subscore will give a numerical assessment of the risk associated with factors based on the analysis of historical transactions across the fraud network and other relevant data provided as part of the query. We will control the limits of transactions, i.e. we put on the red flag when the transaction is not in the standard min-max range of this merchant and his industry. In addition, the subscore and fraud factors include all of the data provided by fraud insight.
Seon Technologies - assists in reducing chargeback overheads and resources lost to fraudulent buyers and protecting legitimate customers; takes control of fraud management by removing threats, bad merchants, and fraudsters from the equation, that enables stronger merchant relationships and protects in processing more payments.
In case of any doubts on the customer or the data accuracy arising out of the ongoing monitoring information verification, the AML/CTF Compliance Person should act as follows:
A sanctions search is part of our CDD requirements. Sanctions screening is a control used in the detection, prevention and disruption of financial crime and, particularly, sanctions risk.
There is a separate but related sanctions regime that imposes restrictions on our ability to do business with those persons and entities on sanctions lists worldwide.
Some entries on the list are specific to a particular person or entity and others are general financial sanctions on all persons and entities in a particular jurisdiction.
Breaching the sanctions regimes would have serious consequences for the Company.
So, the analysis of sanctions risk must be an integral part of the CDD we undertake at the outset of any business relationship commencement and/or payment transaction.
The sanctions screening will be performed in order to receive information about our customers regarding economic, financial, trade sanctions, targeted foreign countries and regimes, terrorists, international narcotics traffickers, those engaged in activities related to the proliferation of weapons of mass destruction, any crime or fraud, whether the customer is from non-cooperative countries and territories, whether he/she is listed in any consolidated lists, to check the debarred parties, blocked officials, to check any threats to the security and AML/CTF compliance. The sanctions screening is conducted both under the onboarding process and in ongoing monitoring procedures of the existed customers. The customer risk profile will serve as a baseline for assessing activities, including potentially suspicious activity.
The Company will document all the screening and assessment results collected for the Company’s record-keeping.
Also, as envisaged in the “11. Wire Transfers & their Screening” section below, the Company shall screen all wire transfer originators and wire transfer beneficiaries against lists and information provided by the FINTRAC and any other relevant authorities in Canada for the purposes of determining if there are any ML/TF risks. The transaction screening will be carried out on a real-time basis (e.g., carry out the filtering of relevant payment instructions before the transaction is executed).
The Company will perform the following:
The customer’s ID information is entered into the Company’s customer database for periodic name screening purposes, as this contributes to the prompt identification whether our existing customers have subsequently fallen under higher risk positions.
Whenever there is cause for suspicion, the client will be asked to identify and verify the source or destination of the transactions, whether they be individuals or company beneficial owners. Other forms of identity confirmation, such as evidence of a long standing relationship with the client, or a letter of assurance from independent and reliable persons or organisations, who have dealt with the client for some time, may also provide a reasonable level of certainty.
In such cases the AML/CTF compliance officer fills out a report and informs the director/senior management. According to the data, the Company will assess the changes and determine whether to apply appropriate ML/TF risk mitigation measures (e.g., enhanced CDD measures) to such customer.
The automatic screening process will take into account the Company’s nature, size and risk profile (e.g., if application of the fuzzy matching calibrated to the Company’s risk profile is likely to result in the generation of an increased number of apparent matches, the Company’s employees and officers will need to have access to CDD information to enable them to exercise their judgment in identifying true hits).
The Company will use the sanctions and high-risk jurisdictions lists for check-up procedures. The Company implemented appropriate arrangements and alerts to perform screening of its customer database when there are changes to the lists of sanctioned individuals/entities.
The Company will comply with Canadian sanctions which are imposed under the United Nations Act (UNA), the Special Economic Measures Act (SEMA) or the Justice for Victims of Corrupt Foreign Officials Act (JVCFOA).
Further is also represented a non-exhaustive databases of targeted lists (including Canada and other sources) that the Company should watch:
To the extent permitted by national legislation, the Company may apply SCDD measures in situations where the ML/TF risk associated with a business relationship has been assessed as low, supported by the Company’s adequate analysis of risks, based on the risk factors (a risk-based approach).
Taking into account the risk-based approach and low ML/TF risks assessment, potentially lower ML/TF risk may be attributed, e.g., to a Government entity; or a government-regulated entity; or a financial institution incorporated or established outside Canada that is supervised for compliance with AML/CTF requirements in consistency with FATF standards.
SCDD is not an exemption from any of the CDD measures; however, the Company may adjust the amount, timing or type of each or all of the CDD measures in a way that is commensurate to the low risk the Company has identified.
The Company is required, when applying the SCDD procedure, to obtain sufficient information for determining the reasonableness of assigning the client to the category of the low-risk of illicit income legalization.
Where applicable - if the Company is satisfied with the ML/TF risks as low and applies SCDD measures, it will be still required to perform ongoing monitoring of business relations and transactions, as well as screen the customer, to ensure compliance with applicable laws and regulations in Canada, including sanctions regulation.
Where so assessed and applicable, the Company can apply the SCDD procedure that is commensurate with the low risk of illicit income legalization, including to:
In case if the Company performs SCDD measures, it shall document the details of its risk assessment and the nature of the SCDD measures, for the Company’s record-keeping purposes.
The Company shall not perform SCDD, if:
In case of higher ML/TF risks identified by the Company, it shall perform ECDD measures to mitigate and manage those risks.
The Company (AML/CTF compliance officer/authorized employee) is required, in addition to implementing the requirements provided for standard identification process described herein to apply the enhanced identification/verification procedure with respect to the customer that may pose the high risk of illicit income legalization and ML/TF risk, in particular to:
The Company carries out necessary and appropriate measures and obtain additional information to ensure that the risk identified is effectively managed, including, by determining the expected type and size of future transactions (operations).
We will identify whether a customer or his / her beneficial owner, or a relative, or close associate of such a customer, belongs to the category of politically exposed persons and heads of international organizations (hereinafter together as PEPs).
Our Company does not establish business relationships with PEPs, under on-boarding procedures. However, existing clients sometimes become PEPs after they enter a business relationship, so we will monitor non-PEP accounts for a change in the PEP status, customer profile or account activity and update customer information. Under the on-boarding procedure we will notify our customers about non-cooperation with PEPs.
We will use monitoring procedures based on which we ensure obtaining respective information from the customer, as well as from public sources and respective electronic databases for the purpose of ascertaining and verifying Politically Exposed Persons.
Pursuant to the Financial Action Task force (FATF) Recommendations and Proceeds of Crime (Money Laundering) and Terrorist Financing Act and associated Regulations, our Company defines the PEP as an individual who is or has been entrusted with a prominent public function. Due to their position and influence, it is recognised that many PEPs are in positions that potentially can be abused for the purpose of committing ML offences and related predicate offences, including corruption and bribery, as well as conducting activity related to TF.
PEPs (and their close links) that fall under and/or relate to the PEP definition include the following:
No public function referred to in points mentioned above shall be understood as covering middle-ranking or more junior officials.
The following definitions, which do not cover middle ranking or more junior officials are identified as follows:
Specific behaviour and individual characteristics that may indicate that an existing customer became a PEP or cause a suspicion:
A connection with a high risk industry may raise the risk of doing business with a PEP. Examples of higher risk industries are:
ECDD measures for an existing customer that became a PEP after establishing business relationship will include the ECDD procedures as described above hereof and may include not limited to, as follows:
conducting enhanced monitoring of the business relationship, potentially by increasing the number and timing of controls applied, and identifying patterns of transactions that warrant additional scrutiny.
The applied lists will include: denied persons list (DPL), foreign sanctions evaders (FSE), specifically designated nationals (SDN), HMT financial sanctions lists, and other lists.
It is obligatory to continuously / on an ongoing basis monitor customers to identify new PEP. If and once the PEP matches for our existing customers are detected, our AML/CTF compliance officer will immediately put it into internal records, report to the senior management and decide on suspension/termination of the business relationship.
The databases we will use to detect a PEP are Regulatory Lists/ Government-issued Lists, Sanctions Lists as indicated in this policy above and databases as follows:
Thus, e.g., through the namescan.io sanctions check database we can screen the PEP multi-territory list, that covers:
The Company will implement appropriate internal risk management procedures and controls to determine if business relations for any customer present a higher risk for ML/TF.
The customer presents and/or may present a higher risk for ML/TF (not limited to):
The Company will perform ECDD for such customers as well as for the PEP customers, as such that present a higher risk for ML/TF so that to manage and mitigate any higher risks.
The Company will not:
in respect of:
We will not have / open any foreign bank accounts and any such account that is a correspondent account (any account that is established for a foreign bank to receive incomings from, or to make payments or other disbursements on behalf of, the foreign bank, or to handle other financial transactions related to such foreign bank) for shell banks and/or any financial institution.
We will not cooperate with shell banks and shell financial institutions.
Likewise, we do not open or maintain, or cooperate with private banking accounts, pursuant to our company business activities and policies.
The Company shall screen all wire transfer originators and wire transfer beneficiaries against lists and information provided by the FINTRAC and any other relevant authorities in Canada for the purposes of determining if there are any ML/TF risks.
The transaction screening will be carried out on a real-time basis (e.g., carry out the filtering of relevant payment instructions before the transaction is executed).
Wire transfers include all forms of electronic transmission including, but not limited to, email, facsimile, short message service or other means of electronic transmission for payment instructions. When the Company sends/receives funds by wire transfer on the account of the wire transfer originator or beneficiary (not when there is a transfer and settlement between the Company and the other financial institution where the Company and the other financial institution are acting on their own behalf as the wire transfer originator and beneficiary), it shall apply procedures as stipulated below.
Apart from that, the Company will monitor payment messages to and from higher risk countries/jurisdictions, as well as transactions with higher risk countries/jurisdictions and suspend or reject payment messages or transactions with sanctioned participants or countries/jurisdictions. Where there are positive hits arising from name screening checks, they will be escalated to the AML/CTF compliance function. The decision to approve or reject the receipt or release of the wire transfer will be made at an appropriate level and documented for the Company’s record-keeping purposes.
1) Identification and recording of information
Before effecting a wire transfer, when the Company is an ordering institution it shall:
2) Cross-border wire transfers below or equal to $1,000
In a cross-border wire transfer where the amount is below or equal to $1,000, when the Company is an ordering institution it shall include in the message or payment instruction that relates to the wire transfer the following:
3) Cross-border wire transfers exceeding $1,000
In a cross-border wire transfer where the amount exceeds $1,000, when the Company is an ordering institution it shall identify/verify the wire transfer originator (if it has not already done so (if it may be applicable) under the CDD measures), and include in the message or payment instruction that relates to the wire transfer the following information:
4) Domestic wire transfers
In a domestic wire transfer, when the Company is an ordering institution it shall:
either
As the ordering institution, the Company will document all collected wire transfer originator and beneficiary information, for its record-keeping purposes.
The Company that is a beneficiary institution shall perform monitoring to identify cross-border wire transfers that lack the required wire transfer originator or beneficiary information.
The Company shall establish a single reference point within the Company to whom all
employees and officers are instructed to promptly refer all transactions suspected in ML/TF, for possible referral to the FINTRAC via STRs, TPR.
The company will provide other reports under PCMLTFA and its associated Regulations and FINTRAC reporting guidance when it`s necessary.
Involved employees will promptly report any potential violations of the Company’s AML/CTF policy to the AML/CTF compliance officer, unless the violations implicate the AML/CTF compliance officer, in which case the employee shall report to the Board/Senior management of the Company. Such reports will be confidential, and the employee will suffer no retaliation for making them.
Pursuant to subsection 9(2) of the Proceeds of Crime (Money Laundering) and Terrorist Financing Suspicious Transaction Reporting Regulations, The Company shall send the report to the FINTRAC as soon as practicable after they have taken measures that enable them to establish that there are reasonable grounds to suspect that the transaction or attempted transaction is related to the commission of a money laundering offence or a terrorist activity financing offence."
These measures include:
After completing the measures that enabled us to determine that we have reasonable grounds to suspect (RGS) that a transaction is related to the commission of an ML/TF offence, we will submit an STR to FINTRAC as soon as practicable (a time period that falls in-between immediately and as soon as possible, within which a suspicious transaction report (STR) must be submitted to FINTRAC). The completion and submission of the STR should take priority over other tasks. In this context, the report must be completed promptly, taking into account the facts and circumstances of the situation.
The Company in accordance to Section 7 and 7.1. of the PCMLTFA will report to the Centre every financial transaction that occurs or that is attempted in the course of their activities and in respect of which there are reasonable grounds to suspect that
In accordance to 7.1.1. of the PCMLTFA Every person or entity referred to in section 5 that is required to make a disclosure under section 83.1 of the Criminal Code or under section 8 of the Regulations Implementing the United Nations Resolutions on the Suppression of Terrorism shall report to the Centre in accordance with the regulations.
The Company will submit a TPR to FINTRAC immediately (In respect of submitting a Terrorist Property Report (TPR), the time period within which a TPR must be submitted, which does not allow for any delay prior to submission).
When the Company send or receive instructions to transfer C$10,000 CAD or more internationally, either in a single transaction or in multiple transactions, within a 24-hour period the Company will submit a report within 5 business days. The company will use FINTRAC web reporting system to send non-SWIFT Electronic Funds Transfer Reports. The Company will send SWIFT EFT reports to FINTRAC electronically by using Batch reporting mechanism.
The detailed description about reporting described in Regulatory reporting procedures of the company.
Throughout the above reporting, the Company keeps 24-hour rule - the requirement to aggregate multiple transactions when they total $10,000 or more within a consecutive 24-hour window and the transactions are:
All transactions that total $10,000 or more within a consecutive 24-hour window are to be reported to FINTRAC in a single report. This means that all transactions at or above the $10,000 threshold that occur in the same 24-hour window must be included in the report and should not be reported separately.
Records of the CDD information covering the business relations, all wire transfers/transactions, account files, as well as business correspondence and results of any undertaken analysis, will be maintained for a period of at least 5 years following the termination of such business relations or completion of such wire transfers/transactions.
Data, documents and information relating to a transaction, including any information needed to explain and reconstruct the transaction, will be maintained for a period of at least 5 years following the completion of the transaction.
The Company will ensure that all documents, data or information held in evidence of customer identity are kept up to date.
All records will be handled in confidence, stored securely, and will be capable of being retrieved without undue delay.
We will document our verification, including all identifying information provided by a customer, the methods used and results of verification, and the resolution of any discrepancies identified in the verification process, if any.
We will keep records containing a description of any document that we relied on to verify a customer’s identity, noting the type of document, any identification number contained in the document, the place of issuance, and if any, the date of issuance and expiration date.
We will keep records containing a description of any document that we relied on to verify a customer’s identity, noting the type of document, any identification number contained in the document, the place of issuance, and if any, the date of issuance and expiration date.
The records will be kept in order to: (i) meet the law requirements; (ii) be able to reconstruct any individual transaction undertaken by the Company (including the amount and type of currency involved) so as to provide, if necessary, evidence for prosecution of criminal activity; (iii) make the documents available to the FINTRAC, CRA (if necessary) or other Canadian relevant authorities and the internal and external auditors for review of the Company's business relations, transactions, records and CDD information.
We will keep a copy of every report that we submit to FINTRAC as a record.
The Company developed appropriate compliance procedures and appointed the AML/CTF compliance officer (as a part of the organizational structure) to coordinate the AML policies and procedures of the Company.
Our AML/CTF compliance officer has a working knowledge of the regulatory and legislative requirements and its implementing regulations and is qualified by experience, knowledge and training. AML/CTF compliance officer reports to the Board of the Company.
The duties of the AML/CTF compliance officer will include an ongoing monitoring of the Company’s compliance with AML obligations, overseeing business relations, as well as communication and training for employees. The AML/CTF compliance officer will also ensure that the Company keeps and maintains all of the required AML/CFT records and will ensure that Suspicious Transaction Reports (STRs) are filed with the STRO when appropriate. The AML/CTF compliance officer is vested with full responsibility and authority to enforce the Company’s AML/CTF procedures and measures.
The responsibilities and tasks of the Company’s AML/CTF compliance officer include, but are not limited to, as follows:
The Internal auditor helps the Company to improve the business processes and efficiency of ML/TF measures. The internal auditor will (i) establish, implement and maintain audit measures to examine and evaluate the adequacy and effectiveness of the Company’s AML/CTF systems, internal control mechanisms and arrangements; (ii) issue recommendations based on the result of work carried out; (iii) verify compliance with these recommendations; (iv) report in relation to the internal audit matters to the senior staff and/or senior management.
The AF should be independent and have sufficient authority, stature and resources. The Company will ensure that the qualification of the AF’s staff, in particular its auditing tools and ML/TF risk analysis methods, are adequate for the Company’s size, location, as well as the nature, scale and complexity of the risks associated with the Company’s business model and activities.
The AF will, following a risk-based approach, independently review and provide objective assurance of the compliance of ML/TF procedures of the Company.
The AF will assess whether the Company’s internal ML/TF control framework is both effective and efficient.
The AF will also verify the integrity of the AML/CTF processes ensuring the reliability of the Company’s methods and techniques, and the assumptions and sources of information used in its internal models (e.g., risk modelling measurements). It will also evaluate the quality and use of qualitative risk identification and assessment tools and the risk mitigation measures taken.
The AF will have access to all the AML/CTF management relevant records, documents, information.
The AF will have access to all the AML/CTF management relevant records, documents, information.
14.3. Employee Hiring & Training & Testing
All affected employees will be provided with training that explains the AML/CTF relevant legislation and regulations. All affected employees will be trained on their responsibilities in relation to ML legislation, and be aware of how to identify and deal with transactions that may involve ML.
We will develop ongoing employee training under the leadership of the AML/CTF compliance officer and Senior Management. The Company will provide an initial training for new employees, and apart from the initial training, the Company should also provide refreshing/repetitive training at least once every two years, or more regularly as appropriate, to ensure that employees and officers are reminded of their responsibilities and kept informed of new developments related to ML/TF
Training will be based on our Company’s size, its customer base, and its resources and be updated as necessary to reflect any new developments in the law.
Our training will include, at a minimum:
We will develop training in our Company, or contract for it. Delivery of the training may include educational pamphlets, videos, intranet systems, in-person lectures and explanatory memos. As part of the employee conduct monitoring, we will subject employee accounts to the same AML procedures as customer accounts, under the supervision of the AML/CTF compliance officer.
We will maintain records to show the persons trained, the dates of training and the subject matter of their training.
We will review our operations to see if certain employees, such as those in compliance, require specialized additional training. Our written procedures will be updated to reflect any such changes.
The Company will maintain a record of all individuals who participated in the training.
The training material will be based on FINTRAC Guidance and other relevant materials.
The executive director of the Company has approved this AML/CTF policy in writing as reasonably designed to achieve and monitor our Company’s ongoing compliance with the requirements of the applicable law and the implementing regulations under it. This approval is indicated by signature below.