Having regard for the safety of the users and due to the legal requirements, Byte Exchange has implemented and started to use KYC policy (customer’s identification), AML / CTF (combating money-laundering and terrorist financing) as it is required from banks and other financial institutions.
The purpose of those policies is an effective combating of money-laundering and terrorist financing (AML / CTF) on our exchange by proper identification of actual users of our accounts and supervision of their transactions. We shall identify and cease transactions made not only to purchase/sell a cryptocurrency, but made mainly to hide the criminal origin of money, finance illegal activity or other unlawful behaviours.
Specific provisions of our policies are confidential and for internal use only, in order to prevent their avoidance by dishonest or fraudulent users. We would like to introduce to you some of the general rules and stipulations of our policies which directly concern you and affect the services we render.
User’s identification
In the first place, we are obliged to identify, beyond a reasonable doubt, the identity of persons enabled to do transactions on our exchange. This is the reason why we collect ID scans, which authenticity is verified with special software of professional external providers.
We require sending “selfie” or your recording with ID document in order to preclude the possibility of using your documents by someone else. Verification of your likeness to the photo from your ID is made with the use of special software of professional external providers or, in case of doubts, done manually by our customer support services.
In case of any doubts, our customer support team will contact you to explain any concerns and solve the issues that arose.
If we cannot determine, beyond a reasonable doubt, that the documents you provided belong to you and are the authentic we won’t be able to let you to execute any transactions.
User’s identification – Companies
In case of all legal entities (companies), the procedure is more stringent and depends on the company’s structure, country, etc. Primarily, we need to establish who is the owner of the company, who can represent it, where the company is based and what is the business of the company.
Since standards regarding governmental documentation of legal entities are different in each country, every time the verification of such users is doing “manually” and is considerably more time-consuming.
AML Compliance Person Designation and Duties
The Company has designated its Directors as its Anti-Money Laundering Policy Compliance officer, with full responsibility for the Company’s AML policy (hereinafter referred as AML Compliance Party or designated Director). The duties of the AML Compliance designated Director, will include monitoring the Company’s compliance with AML obligations, overseeing communication and training for employees. The Designated Director will also ensure that the Company keeps and maintains all of the required AML records, if any. The Designated Director is vested with full responsibility and authority to enforce the Company’s AML policy.
Training Policies
We will develop ongoing employee training under the leadership of the AML Compliance Party and senior management. Our training will occur on at least an annual basis. It will be based on our Company’s size, its customer base, and its resources and be updated as necessary to reflect any new developments in the law. Our training will include, at a minimum:
(1) how to identify red flags and signs of money laundering that arise during the course of the employees’ duties;
(2) what to do once the risk is identified;
(3) what employees' roles are in the Company's compliance efforts and how to perform them; and
(4) the Company's record retention policy.
We will review our operations to see if certain employees, such as those in compliance, margin and corporate security, require specialized additional training. Our written procedures will be updated to reflect any such changes.
Monitoring Employee Conduct and Accounts
We will subject employee accounts to the same AML procedures as customer accounts, under the supervision of the AML Compliance Party. We will also review the AML performance of supervisors, as part of their annual performance review. The AML Compliance Party’s accounts will be reviewed by the AML Compliance Person.
Confidential Reporting of AML Non-Compliance
Employees will promptly report any potential violations of the Company’s AML compliance policy to the AML Compliance Party, unless the violations implicate the AML Compliance Party, in which case the employee shall report to the AML Compliance Party. Such reports will be confidential, and the employee will suffer no retaliation for making them.
Transactions’ monitoring and supervision
Using our proprietary software, we also analyse all transactions that take place on our exchange looking for suspicious and unusual behaviors. Such selected transactions are analysed by our AML specialists and evaluated if they do not provide significant AML / CTF risks or if they needed to be ceased and clarified with the User.
Additional verification
When your trade volume rises, our AML / CTF verification duties increase as well. The same happens when your transactions are “flagged” as suspicious or unusual, or our verification of your personal results in qualifying you as a person imposing significant AML / CTF risk.
In such cases, we can require additional documentation proving your real, exact place of residence, education, occupation, as well as the source of money you are using on the exchange.
Unfortunately, If our AML specialists decide information received from you don’t clarify our doubts, we will be obliged to end our cooperation with you or even report your transactions to relevant authorities.
Basic AM / CTF Rules
Our operating rules include inter alia as follows:
1.Byte Exchange does not accept cash deposits or cash withdrawals in any cases.
2.Byte Exchange does not accept any third parties’ deposits on the user’s account, managing the account on behalf of somebody, joint or shared accounts, etc.
3.Byte Exchange does not allow any exceptions in the field of documentation required from users.
4.Byte Exchange reserves the right to refuse to process the User’s transaction at any time, in case of suspicion of AML / CTF risk.
5.In accordance with the international law, we are not obliged (or even forbidden) to inform our clients, if we report their behaviors as suspicious to relevant authorities.
Sanctioned countries
In accordance with our policies we do not open accounts and do not process transactions for citizens and residents of, as well as people staying in, countries where transactions are prohibited by international sanctions or their internal law regulations, or countries which based on various criteria selected by our AML team (for example Corruption Perceptions Index by Transparency International, FATF warnings, countries with weak anti-money laundering and terrorist financing regimes determined by European Commission) impose high AML / CTF high risk.
Currently these countries are:
Crimea, Donetsk, Cuba, Iran, Luhansk, North Korea, Syria, USA(some states).
KYC verification
When your trade volume rise AML / CTF risk increases as well. That is why we have to introduce proper safety and verification duties. You should remember that this model is a result of the work and experience of our AML team and can be changed as the legal requirements of countries changes as well as a result of gaining new knowledge and experience.
AML Recordkeeping
Our AML Compliance Party and its designee will be responsible for ensuring that AML records are maintained properly. In addition, as part of our AML policy, our Company will create and maintain relevant documentation on customer identity and verification and funds transmittals. We will maintain such documentation for at least five years. We will hold such documentation confidential. We will not inform any third party about the existence of such documentation.
Clearing/Introducing Company Relationships
We will work closely with our third party partners to detect money laundering, if required. We will exchange information, records, data and exception reports as necessary to comply with AML laws.
Additional Risk Areas
The Company has reviewed all areas of its business to identify potential money laundering risks that may not be covered in the procedures described above.