Global Anti-Money Laundering Policy
Last Updated: October 25, 2025
Effective Date: October 25, 2025
Applicable Jurisdiction: Global Operations
Policy Version: 2.0 (Updated for 2024-2025 Regulatory Changes)
1. Introduction and Global Regulatory Framework
NomercyX ("Company") operates as a global cryptocurrency exchange platform committed to the highest standards of Anti-Money Laundering (AML) and Counter-Financing of Terrorism (CFT) compliance. This comprehensive policy establishes our framework for preventing, detecting, and reporting money laundering, terrorist financing, and other financial crimes across all jurisdictions where we operate.
1.1 International Regulatory Standards
- Financial Action Task Force (FATF) Recommendations: 40 Recommendations and interpretive notes (Updated February 2025)
- Bank Secrecy Act (BSA): US federal law requiring financial institutions to assist government agencies
- FinCEN Regulations: Financial Crimes Enforcement Network rules and guidance (Updated September 2024)
- EU AML Package 2024: 6th Anti-Money Laundering Directive and new AMLA framework
- Basel Committee Guidelines: International banking supervision standards
- Wolfsberg Principles: Global banking AML standards
- FATF Travel Rule: Virtual Asset Service Provider (VASP) requirements
- UN Security Council Resolutions: Counter-terrorism financing measures
1.2 Jurisdictional Compliance Framework
🌍 Multi-Jurisdictional Approach
- • United States: BSA, USA PATRIOT Act, FinCEN guidance
- • European Union: 6AMLD, AMLA, MiCA Regulation
- • United Kingdom: Money Laundering Regulations 2017, FCA guidance
- • Canada: PCMLTFA, FINTRAC requirements
- • Australia: AML/CTF Act 2006, AUSTRAC compliance
- • Singapore: PSOA, MAS AML/CFT requirements
- • Japan: JAFIC guidelines, FSA regulations
1.3 Virtual Asset Specific Regulations
- FATF Virtual Asset Guidelines: Updated recommendations for VASPs (July 2024)
- Travel Rule Implementation: Threshold of USD/EUR 1,000 for information sharing
- Unhosted Wallet Regulations: Enhanced due diligence for self-hosted wallets
- DeFi Protocol Oversight: Emerging regulatory frameworks for decentralized finance
- Stablecoin Regulations: Specific AML requirements for stablecoin issuers and exchanges
2. Global Customer Due Diligence (CDD) Framework
2.1 Risk-Based Customer Identification Program
Our Customer Identification Program (CIP) implements a risk-based approach aligned with international best practices and local regulatory requirements across all operating jurisdictions.
Standard Customer Due Diligence (CDD)
Individual Customers
- Full legal name (as per government-issued ID)
- Date of birth and place of birth
- Nationality and tax residency
- Residential address (verified)
- Government-issued photo identification
- Proof of address (utility bill, bank statement)
- Source of wealth and funds declaration
- Occupation and employer information
- Expected transaction volume and patterns
Corporate Customers
- Legal entity name and registration number
- Jurisdiction of incorporation
- Registered business address
- Articles of incorporation/association
- Business license and regulatory permits
- Beneficial ownership structure (25%+ threshold)
- Ultimate beneficial owners (UBOs) identification
- Authorized representatives and signatories
- Business purpose and nature of activities
- Financial statements and tax returns
2.2 Enhanced Due Diligence (EDD) Requirements
⚠️ Enhanced Due Diligence Triggers
Customer-Based Triggers:
- • Politically Exposed Persons (PEPs)
- • High Net Worth Individuals (>$1M)
- • Non-resident customers
- • Cash-intensive businesses
- • Shell companies or complex structures
- • Customers from high-risk jurisdictions
Transaction-Based Triggers:
- • Transactions >$10,000 USD equivalent
- • Cross-border transfers >$3,000
- • Unusual transaction patterns
- • Transactions with high-risk countries
- • Privacy coin transactions
- • Mixing/tumbling service usage
EDD Documentation Requirements
- Source of Wealth Documentation: Bank statements, investment portfolios, business ownership records
- Source of Funds Verification: Transaction history, employment records, business income proof
- Purpose of Relationship: Detailed explanation of intended platform usage
- Enhanced Background Checks: Adverse media screening, sanctions list verification
- Senior Management Approval: Required for all EDD customer onboarding
- Ongoing Monitoring: Increased frequency of reviews and transaction monitoring
2.3 Simplified Due Diligence (SDD)
Simplified Due Diligence may be applied to low-risk customers and transactions, subject to regulatory approval and ongoing risk assessment:
- Regulated Financial Institutions: Banks, investment firms with equivalent AML standards
- Government Entities: Public sector organizations and agencies
- Listed Companies: Publicly traded companies with disclosure requirements
- Low-Value Transactions: Transactions below $1,000 USD equivalent (subject to aggregation rules)
3. Global Transaction Monitoring and Reporting
3.1 International Reporting Thresholds
💰 Currency Transaction Reports (CTR)
- United States: $10,000 USD (FinCEN Form 112)
- European Union: €10,000 EUR (varies by member state)
- United Kingdom: £10,000 GBP
- Canada: CAD $10,000 (FINTRAC)
- Australia: AUD $10,000 (AUSTRAC)
- Singapore: SGD $20,000 (STRO)
🚨 Suspicious Activity Reports (SAR)
- Threshold: Any amount if suspicious
- US: FinCEN SAR (within 30 days)
- EU: National FIU reporting (varies)
- UK: NCA SAR (as soon as practicable)
- Canada: FINTRAC STR (within 30 days)
- Australia: AUSTRAC SMR (within 3 days)
3.2 FATF Travel Rule Implementation
✈️ Travel Rule Compliance
For virtual asset transfers ≥ USD/EUR 1,000, we collect and transmit:
Originator Information:
- • Full name and address
- • Account number/identifier
- • National ID or customer number
- • Date and place of birth (if individual)
Beneficiary Information:
- • Full name and address
- • Account number/identifier
- • Receiving VASP information
- • Transaction purpose (if required)
3.3 Advanced Transaction Monitoring System
Our AI-powered transaction monitoring system employs machine learning algorithms and behavioral analytics to detect suspicious patterns:
Monitoring Scenarios
Volume-Based
- • High-volume transactions
- • Rapid fund movement
- • Velocity thresholds
- • Aggregation patterns
Pattern-Based
- • Structuring activities
- • Round-dollar amounts
- • Timing patterns
- • Geographic anomalies
Behavioral
- • Deviation from profile
- • Unusual asset types
- • New counterparties
- • Risk score changes
Blockchain Analytics Integration
- Address Risk Scoring: Real-time assessment of wallet addresses and transaction history
- Cluster Analysis: Identification of related addresses and entities
- Mixing Service Detection: Identification of privacy-enhancing services and tumblers
- Exchange Attribution: Tracking funds to/from other exchanges and services
- Sanctions Screening: Real-time screening against OFAC and other sanctions lists
- Dark Web Monitoring: Detection of addresses associated with illicit marketplaces
4. Global Sanctions and Prohibited Activities
4.1 International Sanctions Compliance
🌐 Global Sanctions Lists
Primary Sanctions Lists:
- • OFAC SDN List (US Treasury)
- • UN Security Council Consolidated List
- • EU Consolidated Sanctions List
- • UK HM Treasury Sanctions List
- • Canadian Consolidated Sanctions List
- • Australian Consolidated Sanctions List
Specialized Lists:
- • FATF High-Risk Jurisdictions
- • PEP databases (World-Check, etc.)
- • Adverse media databases
- • Law enforcement watch lists
- • Cryptocurrency-specific blacklists
- • Ransomware-associated addresses
4.2 Prohibited Jurisdictions and Activities
🚫 Prohibited Activities
Financial Crimes:
- • Money laundering
- • Terrorist financing
- • Sanctions evasion
- • Tax evasion
- • Fraud and embezzlement
- • Bribery and corruption
Crypto-Specific:
- • Mixing/tumbling services
- • Ransomware payments
- • Dark web marketplace transactions
- • Unregistered securities offerings
- • Market manipulation
- • Unlicensed money transmission
4.3 High-Risk Jurisdiction Management
We maintain enhanced controls for customers and transactions involving high-risk jurisdictions as identified by FATF and other international bodies:
- Enhanced Due Diligence: Additional documentation and verification requirements
- Transaction Limits: Reduced transaction limits and enhanced monitoring
- Senior Approval: Management approval required for all transactions
- Ongoing Monitoring: Increased frequency of account reviews and updates
- Exit Strategy: Procedures for ceasing business relationships when required
5. Governance and Organizational Structure
5.1 AML/CFT Governance Framework
🏛️ Three Lines of Defense Model
First Line: Business Operations
Customer onboarding, transaction processing, initial risk assessment, and day-to-day compliance activities.
Second Line: Compliance Function
Policy development, risk management, monitoring and testing, regulatory reporting, and compliance oversight.
Third Line: Internal Audit
Independent assessment of AML/CFT program effectiveness, audit testing, and recommendations for improvement.
5.2 Key Personnel and Responsibilities
Chief Compliance Officer (CCO)
- Overall AML/CFT program oversight
- Regulatory relationship management
- Board and senior management reporting
- Policy development and updates
- Regulatory examination coordination
AML Officer
- Daily AML operations management
- Suspicious activity investigation
- Regulatory reporting (SARs, CTRs)
- Staff training coordination
- Customer risk assessment
5.3 Board and Senior Management Oversight
- Board Approval: Annual approval of AML/CFT policy and program
- Quarterly Reporting: Regular updates on compliance metrics and issues
- Resource Allocation: Adequate staffing and technology resources
- Risk Appetite: Definition of acceptable risk levels and tolerances
- Culture and Tone: Promoting a strong compliance culture throughout the organization
6. Training and Awareness Program
6.1 Comprehensive Training Framework
New Employee Training
- • AML/CFT fundamentals
- • Company policies and procedures
- • Role-specific responsibilities
- • System training
- • Certification requirements
Annual Refresher Training
- • Regulatory updates
- • New typologies and trends
- • Case studies and scenarios
- • Policy changes
- • Performance feedback
Specialized Training
- • Blockchain analytics
- • Sanctions screening
- • Investigation techniques
- • Regulatory examination
- • Advanced risk assessment
6.2 Training Topics and Content
- Money Laundering Typologies: Traditional and cryptocurrency-specific schemes
- Terrorist Financing: Methods, indicators, and reporting requirements
- Sanctions Compliance: Screening procedures and violation consequences
- Customer Due Diligence: Risk assessment and documentation requirements
- Transaction Monitoring: Alert investigation and case management
- Regulatory Reporting: SAR/STR preparation and filing procedures
- Record Keeping: Documentation and retention requirements
- Privacy and Confidentiality: Information handling and protection
7. Technology and Systems
7.1 AML Technology Stack
🔧 Core AML Systems
Transaction Monitoring:
- • Real-time transaction screening
- • Behavioral analytics and ML models
- • Pattern recognition algorithms
- • Risk scoring and alert generation
- • Case management workflow
Customer Screening:
- • Sanctions list screening
- • PEP database integration
- • Adverse media monitoring
- • Identity verification services
- • Document authentication
7.2 Blockchain Analytics and Intelligence
- Address Risk Assessment: Real-time evaluation of cryptocurrency addresses
- Transaction Graph Analysis: Mapping of fund flows and relationships
- Clustering Algorithms: Identification of related addresses and entities
- Exchange Attribution: Tracking funds to/from other platforms
- Mixing Service Detection: Identification of privacy-enhancing services
- Compliance Reporting: Automated generation of regulatory reports
7.3 Data Management and Privacy
- Data Encryption: End-to-end encryption of sensitive customer data
- Access Controls: Role-based access and audit trails
- Data Retention: Automated retention and disposal procedures
- Backup and Recovery: Secure data backup and disaster recovery
- Privacy Compliance: GDPR, CCPA, and other privacy regulation compliance
8. Record Keeping and Reporting
8.1 Global Record Retention Requirements
📁 Retention Periods by Jurisdiction
Customer Records:
- • US: 5 years after account closure
- • EU: 5 years after relationship ends
- • UK: 5 years after relationship ends
- • Canada: 5 years after account closure
- • Australia: 7 years after relationship ends
Transaction Records:
- • US: 5 years from transaction date
- • EU: 5 years from transaction date
- • UK: 5 years from transaction date
- • Canada: 5 years from transaction date
- • Australia: 7 years from transaction date
8.2 Required Documentation
- Customer Identification: All CDD/EDD documentation and verification records
- Transaction Records: Complete transaction history and supporting documentation
- Monitoring Records: Alert generation, investigation notes, and disposition decisions
- Reporting Records: Copies of all regulatory reports (SARs, CTRs, etc.)
- Training Records: Employee training completion and certification records
- Audit Records: Internal and external audit reports and remediation actions
8.3 Regulatory Reporting Framework
Periodic Reports
- Currency Transaction Reports (CTRs)
- Suspicious Activity Reports (SARs)
- Cross-border wire transfer reports
- Large cash transaction reports
- Beneficial ownership reports
Ad-hoc Reports
- Law enforcement requests
- Regulatory examination responses
- Sanctions violation reports
- Data breach notifications
- Compliance incident reports
9. Independent Testing and Audit
9.1 Annual Independent Testing
We conduct comprehensive annual independent testing of our AML/CFT program by qualified third-party auditors:
- Program Assessment: Evaluation of policy adequacy and implementation effectiveness
- Transaction Testing: Sample-based testing of monitoring and reporting procedures
- Customer File Review: Assessment of CDD/EDD documentation and risk ratings
- Training Evaluation: Review of training program effectiveness and completion rates
- Technology Testing: Assessment of system controls and data integrity
- Regulatory Compliance: Verification of compliance with applicable laws and regulations
9.2 Continuous Monitoring and Quality Assurance
- Monthly Metrics Review: Analysis of key performance indicators and trends
- Quarterly Risk Assessment: Updated assessment of AML/CFT risks and controls
- Semi-Annual Policy Review: Review and update of policies and procedures
- Ongoing Staff Assessment: Regular evaluation of staff performance and training needs
10. Enforcement and Remediation
10.1 Violation Response Framework
⚖️ Progressive Enforcement Actions
Level 1 - Minor Violations:
Warning notice, additional training, enhanced monitoring
Level 2 - Moderate Violations:
Account restrictions, transaction limits, mandatory compliance review
Level 3 - Serious Violations:
Account suspension, fund freezing, regulatory reporting
Level 4 - Severe Violations:
Account termination, asset forfeiture, law enforcement referral
10.2 Remediation Procedures
- Root Cause Analysis: Identification of underlying causes of compliance failures
- Corrective Action Plans: Development of specific remediation measures and timelines
- Process Improvements: Enhancement of policies, procedures, and controls
- Staff Retraining: Additional training for affected personnel
- System Enhancements: Technology upgrades and configuration changes
- Ongoing Monitoring: Enhanced oversight until full remediation is achieved
11. Contact Information and Reporting
📞 AML Compliance Team
Chief Compliance Officer
Email: cco@nomercyx.com
Phone: +1-555-AML-COMP
AML Officer
Email: aml@nomercyx.com
24/7 Hotline: +1-555-AML-TIPS
Compliance Department
Email: compliance@nomercyx.com
Secure Portal: compliance.nomercyx.com
🚨 Suspicious Activity Reporting
Internal Reporting
Email: suspicious@nomercyx.com
Anonymous Tip Line: +1-555-TIP-LINE
Customer Reporting
Report Portal: report.nomercyx.com
WhatsApp: +1-555-REPORT-1
All reports are confidential and protected by law
⚠️ Important Notice
This AML Policy is subject to regular updates to reflect changes in laws, regulations, and industry best practices. All employees and customers are responsible for staying informed of the current version.
Policy Effective Date: October 25, 2025 | Next Review Date: October 25, 2026