P2B Anti-Money Laundering, Countering Financing of Terrorism and Know Your Customer Policy (hereinafter - the "AML/CFT/KYC Policy") is designated to prevent and mitigate possible risks of P2B being involved in any kind of illegal activity.
Both
international and local regulations require P2B to implement effective
internal procedures and mechanisms to prevent money laundering,
terrorist financing, drug and human trafficking, proliferation of
weapons of mass destruction, corruption and bribery and to take action
in case of any form of suspicious activity from its Users.
"Money laundering" means:the
conversion or transfer of property derived from criminal activity or
property obtained instead of such property, knowing that such property
is derived from criminal activity or from an act of participation in
such activity, for the purpose of concealing or disguising the illicit
origin of the property or of assisting any person who is involved in the
commission of such an activity to evade the legal consequences of that
person’s actions;the
acquisition, possession or use of property derived from criminal
activity or property obtained instead of such property, knowing, at the
time of receipt, that such property was derived from criminal activity
or from an act of participation therein;the
concealment or disguise of the true nature, source, location,
disposition, movement, rights with respect to, or ownership of, property
derived from criminal activity or property obtained instead of such
property, knowing that such property is derived from criminal activity
or from an act of participation in such an activity.
Money
laundering also means participation in, association to commit, attempts
to commit and aiding, abetting, facilitating and counseling the
commission of any of the activities mentioned above.
"Terrorist
financing" means the financing and supporting of an act of terrorism
and commissioning thereof as well as the financing and supporting of
travel for the purpose of terrorism.
AML/CFT/KYC Policy covers the following matters:
- Internal Controls;
- Training;
- Compliance officer;
- Verification procedures;
- Risk Assessment;
- Monitoring of transactions;
- AML Program Audit.
Internal Controls
We
have created a structured system of internal control and procedures in
order to comply with applicable AML/CFT laws and regulations, including,
but not limited to:
- verifying users' identity and the information provided;
- special regime for dealing with customers which are politically exposed persons (PEP);
- the identification of unusual activity and suspicious activity reporting (SAR);
- keeping records of Users' documentation and transactional history.
Training
All
the appropriate employees regularly pass a full AML/CFT training, along
with a job‐specific guidance. Training is conducted to ensure that
trainees are informed and act in compliance with all applicable laws and
regulations. New employees pass relevant training before commencing to
work. Training program is updated regularly to reflect current laws and
regulations.
Compliance Officer
The
Compliance Officer is the person, duly authorized by P2B, whose duty is
to ensure the effective implementation and enforcement of the
AML/CFT/KYC Policy. It is the Compliance Officer’s responsibility to
supervise all aspects of P2B’s anti-money laundering and
counter-terrorist financing, including but not limited to:establishing
and updating internal policies and procedures for the completion,
review, submission and retention of all reports and records required
under the applicable laws and regulations; implementing a records
management system for appropriate storage and retrieval of documents,
files, forms and logs;collecting Users' identification information;organisation
of the collection and analysis of information referring to unusual
transactions or transactions or circumstances suspected of money
laundering or terrorist financing, which have become evident;
investigating any significant deviations from normal activity;reporting
to the appropriate authorities (Financial Intelligence Unit etc.) in
the event of suspicion of money laundering or terrorist financing;
providing law enforcement with information as required under the
applicable laws and regulations;periodic submission of written statements on compliance with the requirements arising from law to the management board;organisation of the training of employees;performance of other duties and obligations related to compliance with the requirements of law;updating risk assessment regularly.
The
Compliance Officer is entitled to interact with law enforcement, which
are involved in prevention of money laundering, terrorist financing and
other illegal activity.
Verification procedures
One
of the international standards for preventing illegal activity is
customer due diligence ("CDD"). According to CDD, P2B establishes its
own verification procedures within the standards of anti-money
laundering and "Know Your Customer" frameworks.
Identity verification
P2B’s
identity verification procedure requires the User to provide P2B with
reliable, independent source documents, data or information (national
ID, international passport, bank statement, utility bill etc). For such
purposes P2B reserves the right to collect User’s identification
information for the AML/CFT/KYC Policy purposes.
P2B
will take steps to confirm the authenticity of documents and
information provided by the Users. All legal methods for double-checking
identification information will be used and P2B reserves the right to
investigate certain Users who have been determined to be risky or
suspicious.
P2B
reserves the right to verify User’s identity in an on-going basis,
especially when their identification information has been changed or
their activity seemed to be suspicious (unusual for the particular
User). In addition, P2B reserves the right to request up-to-date and/or
additional documents from the Users while passing verification and even
though they have passed identity verification in the past.
User’s
identification information will be collected, stored, shared and
protected strictly in accordance with the P2B’s Privacy Policy and
related regulations.
While
verification procedures users are checked against sanctions and watch
lists, including the Office of Foreign Assets Control (OFAC) and PEP
list.
Risk Assessment
P2B,
in line with the international requirements, has adopted a risk-based
approach to combating money laundering and terrorist financing. By
adopting a risk-based approach, P2B is able to ensure that measures to
prevent or mitigate money laundering and terrorist financing are
commensurate to the identified risks. This will allow resources to be
allocated in the most efficient ways. The principle is that resources
should be directed in accordance with priorities so that the greatest
risks receive the highest attention.
Monitoring of transactions
The
Users are known not only by verifying their identity (who they are)
but, more importantly, by analyzing their transactional patterns (what
they do).
Therefore,
P2B performs users' transactions monitoring, risk‐assessment,
suspicious activity detection and a variety of compliance-related tasks,
including capturing data, filtering, record-keeping, investigation
management, and reporting. P2B reserves the right to use for that
special software tools and external services.
System functionalities include:daily
check of Users against recognized "black lists", aggregating transfers
by multiple data points, placing Users on watch and service denial
lists, opening cases for investigation where needed, sending internal
communications and filling out statutory reports, if applicable;case and document management.
With regard to the AML/KYC Policy, P2B will monitor all transactions and it reserves the right to:ensure that transactions of suspicious nature are reported to the proper bodies, law enforcement through the Compliance Officer;request the User to provide any additional information and documents in case of suspicious transactions;suspend or terminate User’s Account when P2B has reasonably suspicion that such User engaged in illegal activity.
The
above list is not exhaustive and the Compliance Officer will monitor
Users' transactions on a day-to-day basis in order to define whether
such transactions are to be reported and treated as suspicious or are to
be treated as bona fide.
If
a transaction is inconsistent with a user’s usual activities, this
transaction may be considered suspicious. Data and transaction
monitoring tools are used to identify uncommon patterns of user’s
activity.
After
review and investigation, it is Compliance Officer’s decision whether
to file a SAR or not. Once a SAR is filed with a relevant agency, a copy
of filing documentation is maintained onsite. SAR filing is
confidential and only the P2B’s employees involved in the investigation
and reporting process will be aware of its existence. All records are
retained for a term prescribed by applicable law and internal procedures
and are available at official request of authorized state body
according to law.
AML Program Audit
The
Compliance Officer is responsible for conducting AML/CFT audit at least
annually. Other audit demands are set in internal policies and
procedures.