RULES FOR THE PREVENTION OF MONEY LAUNDERING AND (OR) TERRORIST FINANCING
- GENERAL PROVISIONS
- These Rules for The Prevention of Money Laundering and (or) Terrorist Financing (hereinafter – the Rules) are prepared to ensure the prevention of money laundering and terrorist financing in activity of IO GLOBAL UAB (hereinafter – the Company).
- The Rules describe how the Company will organize and ensure the adequate anti-money laundering and counter terrorism financing procedures. The implementation of the Rules will ensure that the name, reputation and financial integrity of the Company, whilst ensuring compliance with all necessary laws and regulations.
- The provisions of the Rules must be adhered to by all operations, organisation and staff of the Company.
- The Rules are prepared in accordance with the Law on the Prevention of Money Laundering and Terrorist Financing of the Republic of Lithuania (hereinafter – the Law) and other applicable legal acts of the Republic of Lithuania.
- Unless the Rules state otherwise, all terms used therein have the meaning indicated in the Law and other applicable legal acts.
- DEFINITIONS
- Unless otherwise required by the context, the following terms beginning in a capital letter shall be taken to have the following definitions:
- Customer – a legal or natural person performing monetary operations or concluding transactions with the Company;
- Company – Io global UAB, legal entity code 306355922, registered address at Vilkpėdės g. 22, LT-03151, Vilnius;
- Responsible Employee – an employee appointed by the CEO who is responsible for the implementation of measures for the prevention of money laundering and (or) terrorist financing in accordance with the Rules;
- Prominent Public Functions – functions which are listed in Article 19(2) of the Law or are included on the list of prominent public functions published by the FCIS;
- Close Family Member – spouse, a person with whom a civil partnership is registered, parents, siblings, children and spouses or civil partners of children.
- Business relationship – a business, professional or commercial relationship between a Customer and the Company which is connected with their professional activities and which is expected, at the time when the contact is established, to have an element of duration.
- Beneficial Owner – a natural person, who is the owner of a Customer (a legal person) or controls the Customer, and/or a natural person for the benefit of which a transaction or activity is being conducted. The Beneficial Owner is considered to be:
- In a legal person:
- a natural person who owns the legal person or who controls it either directly or indirectly by owning a sufficient percentage of the legal person’s shares or voting rights, including bearer shares and control through other means, other than a company listed on a regulated market that is subject to disclosure requirements consistent with EU law or subject to equivalent international standards which ensure adequate transparency of ownership information;
- a natural person holding 25 % plus one share or an ownership interest of more than 25% in the legal person is considered to be a direct owner. A natural person holding 25 % plus one share or an ownership interest of more than 25 % in a legal entity or entities which control or hold 25 % plus one share or an ownership interest of more than 25 % in a legal entity is considered to be an indirect owner;
- a natural person performing the role of the senior manager if the person in point (i) above cannot be determined or there are doubts on whether the person determined is the Beneficial Owner;
- in the case of trusts:
- the settlor;
- the trustee(s);
- the protector, if any
- the beneficiaries, or where the individuals benefiting from the legal arrangement or entity have yet to be determined, the class of persons in whose main interest the legal arrangement or entity is set up or operates;
- any other natural person exercising ultimate control over the trust by means of direct or indirect ownership or by other means;
- in the case of legal entities such as foundations, and legal arrangements similar to trusts, the natural person(s) holding equivalent or similar positions to those referred to in point (b);
- In a legal person:
- 1.8.EU Member State – a member state of the European Union or the European Economic Area;
- 1.9.Third Country – a country which is not a member state of the European Union or the European Economic Area;
- 1.10.FCIS – The Financial Crime Investigation Services under the Ministry of the Interior of the Republic of Lithuania;
- 1.11.Politically Exposed Person (PEP) – a natural person who is carrying out or has carried out Prominent Public Functions, their Close Family Members and Close Associates. A person who has not carried out Prominent Public Functions during at least the last year by the date of entering the Business relationship or making of a transaction or such a person’s Close Family Members or Close Associate are not considered as politically exposed persons;
- 1.12.Suspicious Financial Operation – a monetary transaction, which is performed with funds, which are suspected to have been received (either directly or indirectly) from criminal activities or from participating in such activities or/and are related to terrorist financing;
- 1.13.Close Associates – natural persons who are known to have joint Beneficial Ownership of legal entities or legal arrangements, or any other close business relations, with a Politically exposed person and (or) natural persons who have sole Beneficial Ownership of a legal entity or legal arrangement which is known to have been set up for the de facto benefit of a Politically exposed person;
- 1.14.Virtual Currency – a digital instrument with digital value, but without the legal status of currency or money, which is not issued or underwritten by a central bank or other public authority, and which is not necessarily pegged to a currency, but which is recognized by natural or legal persons as a medium of exchange, and which can be electronically transferred, stored, sold, exchanged, exchanged, invested, and used for settlement;
- 1.15.Virtual Wallet – public key addresses which are generated for virtual currency addresses for the storage and management of virtual currencies entrusted to other natural or legal persons (third parties) but remaining in their ownership.
- 1.16.KYC – know your customer.
- 1.17.KYT – Know-your-transaction is a process that gathers information on transactions made by a financial business. It assesses the transaction are legal and not linked to financial crimes.
- Unless otherwise required by the context, the following terms beginning in a capital letter shall be taken to have the following definitions:
- CUSTOMER IDENTIFICATION
- The Company takes all necessary, proportionate measures in order to identify its Customer and to verify the identity of the Customer and Customer’s Beneficial Owners. The Customer and Customer’s Beneficial Owners cannot be anonymous or use fictitious names. The Company takes measures and determine identity of the Customer or his representative in the following cases:
- before establishing a Business relationship;
- before conducting one or several related Virtual Currency transactions (exchanges) or allowing a deposit of Virtual Currency on a Virtual Wallet the value of which is up to or equal to EUR 700 at the time of the transaction and/or deposit;
- if there is suspicion that information previously provided about the Customer or his representative is incorrect and/or incomplete;
- in any other case, when there are suspicions that an act of money laundering and / or terrorist financing is, was or will be carried out.
- The Company establishes Customer’s proof of address before allowing the Customer to conduct Virtual Currency transactions or allowing a deposit of Virtual Currency on a Virtual Wallet the value of which is up to or equal to EUR 10,000. For a sum greater than EUR 10,000, Source of Wealth must be received for KYC and risk assessment purposes.
- The Company establishes Customer’s identity only remotely, i. e. when the Customer is not physically present according to Annex no. 4.
- The Company takes all necessary, proportionate measures in order to identify its Customer and to verify the identity of the Customer and Customer’s Beneficial Owners. The Customer and Customer’s Beneficial Owners cannot be anonymous or use fictitious names. The Company takes measures and determine identity of the Customer or his representative in the following cases:
Remote Customer identification
- The Company establishes Customer’s (natural person’s or legal person representative’s) identity remotely by using the following measures:
- when using information from third parties about the Customer or the beneficial owner in accordance with the procedure laid down in the Law;
- when information about the Customer’s identity is confirmed with a qualified electronic signature supported by a qualified certificate for electronic signature which conforms to the requirements of Regulation (EU) No 910/2014;
- when using electronic means allowing direct video streaming in one of the following ways:
- the original of the identity document or an equivalent residence permit in the Republic of Lithuania is recorded at the time of direct video streaming and the identity of the Customer is validated using at least an advanced electronic signature which conforms to the requirements laid down in Regulation (EU) No 910/2014;
- the facial image of the Customer and the original of the identity document or an equivalent residence permit in the Republic of Lithuania shown by the Customer is recorded at the time of direct video streaming.
- In every case establishing Customer’s identity remotely by using measures specified in paragraph 9 is allowed only when there are all conditions laid down in the Law.
- When establishing Customer’s identity remotely, the Company shall:
- verify whether there are any circumstances to apply enhanced Customer due diligence. If such circumstances are present the procedures for enhanced Customer due diligence accordingly shall be followed;
- assess whether the Customer provides copies of valid identity documents or corresponding travel documents which photographs are matching. This requirement does not apply if the identity is being determined using a qualified electronic signature;
- find out whether the Customer will act on his own behalf or someone else’s interests;
- verify whether a representative has legal permit or power of attorney to act in the name of the Customer;
- to receive additional documents with the necessary information, if additional information is required from the Customer;
- check whether Customer or Customer’s beneficiary is included in the list of people that are financially sanctioned by Lithuania, European Union (EU sanctioned person list) and United Nations;
- use reliable and independent sources to verify whether the Customer is a PEP such as Annex no. 2 and Annex no. 4.
- If the Customer is represented by another person, the Company shall request proof of power of attorney and, if possible, check its validity (i.e. if the Customer or its representative has the right to issue such a power of attorney), expiry date, actions that representative can undertake in the name of the Customer. Power of attorney shall comply with rules established in the Civil Code of the Republic of Lithuania. In case the power of attorney is given by the Customer natural person, such power of attorney on behalf of the Customer shall be certified by the notary.
- The Company establishes Customer’s (natural person’s or legal person representative’s) identity remotely by using the following measures:
- ESTABLISHING BENEFICIAL OWNER’S IDENTITY
- The Company shall always establish the identity of Beneficial Owner of the Customer (in accordance to the Law and these Rules) this includes customers re-screening against sanctions lists when there is a change in their corporate ownership structure.
- The Customer shall submit the following data on the Beneficial Owner:
- Name/names;
- Surname/surnames;
- Personal identification number (in the case of a foreigner: date of birth (where available – personal number or any other unique sequence of symbols granted to that person, intended for personal identification, the number and period of validity of the residence permit in the Republic of Lithuania and the place and date of its issuance);
- Citizenship.
- The data submitted by the Customer shall be validated using electronic identification means issued in the European Union which operate under the electronic identification schemes with the assurance levels high or substantial, or with a qualified electronic signature supported by a qualified certificate for electronic signature which conforms to the requirements of Regulation (EU) No 910/2014, or using electronic means allowing direct video streaming.
- PROHIBITION TO ENTER INTO A BUSINESS RELATIONSHIP
- It is forbidden to start Business relationship if the Customer and / or his representative:
- 1.1.fails to submit the data confirming his identity;
- 1.2.submits not all the data or where the data are incorrect;
- 1.3.avoids submitting the information required for establishing his identity,
- 1.4.conceals the identity of the Beneficial Owner or avoids submitting the information required for establishing the identity of the Beneficial Owner or the submitted data are insufficient for that purpose;
- 1.5.the Company, due to the Customer’s actions or omissions, is not able to ensure proper compliance with the Law and the related legal acts.
- In such cases, specified in paragraph 17, the Company shall, upon assessment of the threat posed by money laundering and/or terrorist financing, decide on the appropriateness of forwarding a report on a suspicious monetary operation or transaction to the Financial Crime Investigation Service of the Republic of Lithuania (hereinafter – the FCIS).
- If the Company is unable to comply with points above, the Company shall not conduct business relations with such Customer. In these cases, the Responsible Employee of the Company has to evaluate possible money laundering or terrorist financing threat and inform the CEO and FCIS.
- If the Customer avoids or declines a request by the Company to provide information on source of assets, money and etc., the Responsible Employee has to inform the CEO. In that case CEO shall make a decision to terminate Business relationship with the Customer and the Responsible Employee shall inform FCIS. The Responsible Employee has a responsibility to take immediate action to interrupt money laundering and / or terrorist financing.
- Information gained identifying the Customer and beneficiary owner, monitoring Customer activities has to be documented either physically or electronically.
- It is forbidden to start Business relationship if the Customer and / or his representative:
- CUSTOMER CLASSIFICATION FOR DUE DILIGENCE PURPOSES
- All Customers should be classified according to the risks of being involved in money laundering or terrorist financing (TF).
- Risk categorization shall encompass three different Customers risk levels.
- Such categorization shall be based on multiple parameters, including, but not limited to:
- Customer’s identity;
- Customer’s residency (registration place, if Customer is a legal entity);
- Nature of business activity;
- Actual location of business activities;
- Customer’s (legal entity’s) ownership and complexity of control structure;
- Nationality of Beneficial Owner;
- Volume and nature of transactions carried out by the Customer;
- Social / financial status;
- The following Customer risk classification is used:
- Low risk Customers:
- In the cases specified by the European Supervisory Authorities and the European Commission.
- In the cases where the Customers are legal persons whose securities are admitted to trading on a regulated market in one or more EU Member States;
- In the cases where the Customers are entities of public administration – state and municipal institutions and institutions, the Bank of Lithuania;
- In the cases where the Customer is a financial institution covered by the Law (or a financial institution registered in another European Union Member State).
- The Customer is identified as low risk in accordance with the Company’s Risk Assessment Procedure.
- 4.2.Medium risk Customers:
- All other Customers not identified as low or high risk.
- 4.3.High risk Customers – the Customer are categorized as high-risk Customer if one of the following criteria is applicable:
- The Customer or his / her representative or at least one of the Customer’s Beneficial Owners is a PEP;
- During the identification procedure the Customer avoids performing actions necessary for the verification of his / her identity and providing information about him / herself;
- At the request of the Company, the Customer did not provide the documents evidencing the financial activities (documents evidencing the transactions concluded or being concluded by the Customer and other documents evidencing the financial activities performed or being performed by the Customer);
- The Responsible Employee of the Company establishes existence of the features unusual to the ordinary activities performed by the Customer (performance of monetary operations with larger amounts, complex transactions, transactions are carried out in an unusual pattern etc.);
- The Customer’s age, official position, status and / or financial condition (low income of the Customer when compared with the extent of the Customer’s financial activities) do not comply objectively with the financial activities performed by the said Customer;
- If a suspicion is raised during the monitoring of Customer’s business relations with the Company.
- The Customer is determined to be of a high risk in accordance with the Company’s Risk Assessment Procedure.
- Low risk Customers:
- INDENTIFICATION OF POLITICALLY EXPOSED PERSONS
- The Company shall consider its Customers to be PEP’s when at least one of the following criteria is met:
- 1.1.A citizen on the Republic of Lithuania or the European Union declares that they have been entrusted with Prominent Public Functions or that they are Close Family Members or Close Associates of such a person (as defined in section I of the Rules);
- 1.2.The Company’s employees determine that the natural person is a PEP by using public sources and (or) by obtaining such information from third parties, such sources may include, but are not limited to the Chief Official Ethics Commission and commercial databases which list PEP’s;
- 1.3.A representative of a legal person declares that the shareholders (natural persons) of the legal person have been entrusted with Prominent Public Functions or that they are Close Family Members or Close Associates of such a person.
- The Company shall consider its Customers to be PEP’s when at least one of the following criteria is met:
- VIII.ENHANCED CUSTOMER IDENTIFICATION PROCEDURE
- The enhanced Customer identification is performed:
- 1.1.Where transactions or Business relationships are carried out with PEP’s;
- 1.2.In the cases indicated by the European supervisory authorities and the European Commission;
- 1.3.If according to the risk assessment and management procedures established by the Company a higher risk of money laundering and / or terrorist financing is determined. When assessing the risks of money laundering and / or terrorist financing, it is necessary to assess the risk factors of possible increased money laundering and / or terrorist financing identified in these Rules.
- When applying enhanced Customer identification procedure for Customers that are PEP’s, the Company shall:
- 2.1.Identify whether the Customer and (or) the Beneficial Owner of the Customer are PEP’s;
- 2.2.Get consent from the CEO of the Company to start or maintain Business relationship with that Customer, when he becomes a PEP;
- 2.3.Take adequate measures in order to determine the source of assets and funds involved in Business relationship and contracts;
- 2.4.Ensure identification of unusual transactions and regular review of the information about such Customer and its Transactions that the Company holds;
- 2.5.Maintain enhanced activity monitoring of PEP’s.
- When a PEP stops holding important public positions, the Company shall, for at least 12 months, continue to consider the ongoing risks of that person and apply appropriate measures at the risk level, until it is determined that the person concerned no longer has the risk inherent in the Customer being considered a PEP.
- When applying enhanced Customer identification procedure in the cases specified by the European Supervisory Authorities and the European Commission, the Company shall choose the measures referred to in the documents of the European Supervisory Authorities and the European Commission which identify such cases.
- When applying enhanced Customer identification procedure if according to the Risk assessment procedure (Annex 1) a high risk of money laundering and / or terrorist financing is determined, the Company shall in all cases:
- 5.1.Collect additional information on the Customer and / or its Beneficial Owner;
- 5.2.Collect additional information about the nature of the Business relationship;
- 5.3.Collect information about the purpose of the planned and / or executed Transactions;
- Additionally, the Company in its discretion may apply any of the following measures in addition to the measures described in point 41 of the Rules:
- 6.1.Take necessary measures to identify the source of the Customer’s and Beneficial Owner’s funds and assets related to the Business relationship or Transaction;
- 6.2.Obtain approval of CEO for establishing or continuing the Business relationship;
- 6.3.Conduct enhanced ongoing monitoring of the Business relationship by increasing the number and timing of control applied, and by categorising types of Transactions that will need further investigation;
- It is required to re-establish Customer’s identity using enhanced Customer identification procedure if:
- 7.1.The Customer knowingly provides wrong information about beneficiary or himself;
- 7.2.The Customer hides information.
- The enhanced Customer identification is performed:
- ASSESMENT OF THE RISK
- The Company shall assess the risk of the operations being used for money laundering and terrorist financing.
- The risk assessment shall be conducted on an annual basis.
- Risk Assessment Procedure provided in Annex No 1 outlines the principal methodology which shall be used to conduct and update the risk assessment for purposes of anti-money laundering and terrorist financing prevention.
- ASSURANCE TESTING
- Testing Methodologies:
- Assurance testing shall be conducted periodically, as per the risk-based approach determined by the AML compliance team.
- Testing methodologies shall include, but are not limited to, sample testing, scenario-based testing, and data analysis techniques.
- Testing procedures shall be documented, including the scope, objectives, methodologies, and findings of each assurance testing activity.
- Independence and Objectivity:
- Assurance testing shall be conducted by independent personnel or external auditors to ensure objectivity and impartiality.
- Testing personnel shall not have any direct involvement in the development or operation of the AML systems and controls being tested.
- Testing Criteria:
- Testing shall be based on predetermined criteria derived from regulatory requirements, internal policies, and industry best practices.
- Testing criteria shall be periodically reviewed and updated to reflect changes in regulatory requirements and emerging risks.
- Reporting and Escalation:
- Findings from assurance testing shall be documented in a comprehensive report, detailing any deficiencies, weaknesses, or non-compliance identified.
- Significant findings shall be promptly escalated to senior management and the AML compliance officer for remediation and further action.
- Remediation and Follow-Up:
- Management shall develop and implement remedial actions to address any deficiencies identified during assurance testing.
- Follow-up testing shall be conducted to verify the effectiveness of remedial actions and ensure compliance with regulatory requirements.
- All documentation related to assurance testing activities, including testing plans, procedures, findings, and remediation efforts, shall be adequately maintained and retained in accordance with the company record-keeping policies and regulatory requirements.
- Testing Methodologies:
- PERIODIC UPDATE OF CUSTOMER’S INFORMATION
- By considering the Customer categorisation the Customer’s information shall be updated and the Customer’s identity shall be verified repeatedly:
- 1.1.If the Customer is low risk Customer – every 2 years;
- 1.2.If the Customer is medium risk Customer – every year;
- 1.3.If the Customer is high risk Customers – every 6 months.
- The Customer categorisation to the respective risk group shall be registered. When necessary, the data shall be updated e.g. by the external KYC provider Sum&Substance and KYT provider Elliptic Enterprises Limited.
- By considering the Customer categorisation the Customer’s information shall be updated and the Customer’s identity shall be verified repeatedly:
- MONITORING, PRESENTATION OF INFORMATION TO THE FCIS, DETERMINATION AND SUSPENSION OF SUSPECTED MONEY OPERATIONS AND TRANSACTIONS
- The Company gathers information about the Customer risk profile and expected behaviour when the Customer applies for Company’s services. The gathered information provides information about the expected behaviour of the Customer and a baseline for identification of suspicious activity.
- When suspicious activity is identified, or the Customer otherwise has a suspicious behaviour or pattern that indicates a risk for money laundering, the Company shall seek to investigate the behaviour and to provide a rationale for the identified suspicious behaviour by asking the Customer for additional information to rule out inappropriate behaviour or attempt to launder money. Examples of questions that could be asked:
- What is the purpose of the requested financing?
- Where does the income / revenue come from?
- Why do you want the money to be transferred to this specific account?
- Etc.
- The Company has identified indicators, presented below, which shall lead to an inquiry to find out more information about the rationale of the activity. When adequate information about the rationale behind the transaction or behaviours is collected and if the explanation seems reasonable a transaction may be performed. The Company shall notify the FCIS of cases in which the Company:
- 3.1.Knows, receives information or has reasonable grounds to suspect that money laundering and / or terrorist financing has been, is being or will be committed or has been attempted;
- 3.2.Suspects or has reasonable grounds to suspect that Customer’s funds are derived from criminal activity;
- 3.3.Suspects or have reasonable grounds to suspect that transactions or activities involve terrorist financing.
- The Company shall notify the FCIS about the Customer’s suspicious (and not only executed, but also intended to be executed suspicious) transactions (irrespective of the size of the monetary transaction), taking into account:
- 4.1.Criteria for identifying money laundering and suspicious monetary transactions or transactions related to the Customer behaviour:
- During the establishment of business relations, the Customer or his representative avoids providing the information necessary to determine his identity, hides the identity of the beneficiary or avoids providing the information necessary for determining the beneficiary, presents documents with doubtful authenticity, etc.;
- It is difficult to obtain information or documents from the Customer necessary for the monitoring of business relations: it is difficult to contact the Customer, the Customer is often changing its place of residence and contact information; no one responds when trying to call to the phone number provided by the Customer or his representative or it is permanently disabled; the Customer or his representative does not answer e-mails;
- The Customer is not able to answer the questions asked about his / her financial activity or planned financial activity, its nature, and behaves too nervously;
- The Customer declares his willingness to end the business relations with the Company when asked to provide the information necessary for monitoring his business relations;
- The Customer refuses to provide data on the origin of money or attempted to do so and / or to substantiate it by appropriate documents
- Several companies are registered at the address of the Customer or their representative.
- 4.2.Criteria related to monetary transactions or transactions executed by the Customer or his representative:
- Monetary transactions or transactions do not correspond to the regular cooperation with the Company;
- Customer identification data and information on performed Virtual Currency exchange operations or transactions in Virtual Currency, if the value of such monetary operations or transaction is equal to or exceeds EUR 15,000 or the equivalent amount in foreign or virtual currency notwithstanding whether the transaction is in one or more related monetary transactions. Several interconnected monetary transactions shall be considered to be several Virtual Currency exchange operations or transactions in Virtual Currency in one day, where the total amount of transactions and transactions is equal to or exceeds EUR 15,000 or the equivalent amount in foreign or virtual currency at the time of the transaction;
- The Customer performs monetary transactions or transactions without a clear economic basis;
- The Customer performs monetary transactions or transactions where it is difficult or impossible to identify the beneficiary;
- The Customer, the Customer’s representative, a person who is beneficiary of a monetary transaction or transaction, is subject to financial sanctions in accordance with the Law on the Implementation of Economic and Other International Sanctions of the Republic of Lithuania;
- The age, current position, financial status of the Customer (the Customer’s income / revenue is small compared to the amount of his financial activity), objectively does not correspond to the financial activity performed by this Customer.
- 4.1.Criteria for identifying money laundering and suspicious monetary transactions or transactions related to the Customer behaviour:
- In case of knowledge or identifying threshold criteria of a transaction(s) the Company shall notify the FCIS, no later than within three business days.
- The Company shall inform the FCIS about monetary transactions that do not meet any of the criteria mentioned above if the Company has a suspicion of a monetary transaction and / or Customer’s activity. The suspicion may be caused by various objective and subjective circumstances, for example, the Customer carries out monetary transactions that are unusual for his activity, provides incorrect information about himself or a monetary transaction, and avoids providing additional information (documents).
- Suspicious monetary transactions or transactions are objectively determined by focusing on the Customer’s activities that by their nature may relate to money laundering and / or terrorist financing, also by the Customer and beneficiary identification and continuous monitoring of the Customer’s Business relationships, including transactions, which were concluded during such relationships. In assessing whether a monetary operation or transaction is suspicious, the Company is not required to determine whether there is a criminal offense. The subjective allegations made by the employee of the Company are sufficient for the assessment.
- If the employee of the Company finds that a monetary transaction or transaction performed by the Customer is suspicious, regardless of the amount of such transaction, the Company immediately suspends this transaction and no later than within 3 business hours informs the CEO of the suspended transaction and performs an STR report.
- In case of knowledge or suspicion of suspicious monetary transactions or transactions, the Company shall immediately notify the FCIS, no later than within three working hours after such knowledge or suspicion, if the Company knows or suspects that any value asset is directly or indirectly received from or involved in a criminal offense, also if the Company knows or suspects that the assets is intended to support one or several terrorists or a terrorist organization.
- The Company, upon receipt of a written instruction from the FCIS to suspend suspicious monetary transactions or suspicious transactions performed by the Customer, suspends these transactions from the time of notification or the moment of the specified circumstances up to 10 business days. The Responsible Employee of the Company submits instructions to the required employees of the Company.
- If the Company does not receive an obligation to perform a temporary restriction of ownership within 10 working days from the receipt of the prescribed notification or receipt of a written instruction in accordance with the procedure established by the Code of Criminal Procedure of the Republic of Lithuania, the monetary transaction or transaction shall be renewed. The Responsible Employee of the Company submits instructions to the appropriate employees of the Company.
- Upon receipt of the FCIS notification that the suspension of a monetary transaction or transaction may interfere with the investigation of money laundering or terrorist financing and other criminal acts related to money laundering and / or terrorist financing, the Company shall not suspend suspicious monetary transactions or suspicious transactions performed by the Customer and renew suspended monetary transactions or transactions from the time of notification or the moment of the specified circumstances.
- A notification to the FCIS regarding a suspicious monetary transaction or transaction shall include:
- 13.1.The identity of the Customer, his representative (if the monetary transaction is performed or the transaction is concluded through a representative);
- 13.2.Criteria approved by the FCIS, according to which a monetary transaction or transaction is identified as suspicious;
- 13.3.A suspicious monetary transaction or a suspicious transaction;
- 13.4.The date of the suspicious monetary transaction or the suspicious transaction, the description of the assets in the transaction (money, etc.) and its value (amount of money, currency in which the monetary transaction or transaction is performed, etc.);
- 13.5.Account management methods;
- 13.6.Contact information (phone numbers, email addresses, contact persons, their telephone numbers, e-mail addresses) of the Customer, his representative (if the monetary transaction is carried out or the transaction is concluded through a representative);
- 13.7.The date and time of suspicious monetary operation or suspicious transaction suspension;
- 13.8.A description of the assets the Customer cannot manage or use from suspicious monetary transaction or suspicious transaction suspension (location and other information describing the asset);
- 13.9.If the suspicious monetary transaction or transaction has not been stopped, – the reasons for not stopping it;
- 13.10.Another relevant information in the opinion of the Company.
- A notification regarding information about suspicious monetary transactions or suspicious transactions shall be submitted to the FCIS upon joining the Information System of FCIS and by filling in an electronic form for providing information on suspicious financial transactions or suspicious transactions approved by the Director of the FCIS (hereinafter – the Information provision form) according to the guidelines for completing the information form approved by the Director of the FCIS.
- When there is no possibility of joining the FCIS’s information system and completing the Information provision form due to technical reasons, and also in urgent cases, the Company may submit information by telephone, fax or e-mail. The information provided on the phone must be described and no later than the next business day after the submission of the information by telephone submitted in writing, fax or e-mail.
- A notification regarding the person, responsible for AML/CTF function the Company shall notify the FCIS about such appointments not later than within 7 business days from the date of the appointment and shall be notified in writing by email dokumentas@fntt.lt or ppps@fntt.lt to the FCIS.
- The Company has identified indicators, presented below, which shall lead to an inquiry to find out more information about the rationale of the activity. When adequate information about the rationale behind the transaction or behaviours is collected and if the explanation seems reasonable a transaction may be performed. The Company shall notify the FCIS of cases in which the Company:
- REGISTRIES MANAGEMENT
- The Company shall keep a register of:
- 1.1.Monetary transactions and transactions described in the Law;
- 1.2.Reported and suspicious monetary transactions or transactions determined in accordance with the criteria given in paragraph XI.53;
- 1.3.The Customers with whom transactions or Business relationships were terminated under the circumstances specified in Article 18 of the Law or under any other circumstances related to violations of the procedure for the prevention of money laundering and / or terrorist financing.
- The Responsible Employee of the Company shall enter the following information into the registries:
- 2.1.The data confirming the identity of the Customer, his representative (if any) (first name and surname, date of birth, personal identification number or other unique character assigned to this person for identifying the person / legal entity name, legal form, business address, company code if such code is given).
- 2.2.Data on a monetary transaction or transaction – the date of execution of the transaction, description of the assets underlying the transaction (Virtual Currency, money, etc.) and its value (amount of money, currency of a monetary transaction or transaction, etc.);
- In addition to the data specified in the paragraph 53 of these Rules, the data on the beneficiary (name, surname, date of birth, personal identification code or other unique character assigned to this person, for the purpose of which is given to the person) shall be entered in the registry of suspicious monetary transactions and transactions and also which FCIS approved criteria for identifying the Customer’s monetary transaction or transaction as a suspicious transaction or transaction this data meets.
- Customers’ with whom transactions or Business relationships were terminated under the circumstances specified in paragraph 18 of the Law or under any other circumstances related to violations of the procedure for the prevention of money laundering and / or terrorist financing information on the origin of assets, other supplementary data or other information related to violations of the procedures for the prevention of money laundering and / or terrorist financing, the data specified in paragraph 65.1 of these Rules, as well as the data on the beneficiary (name, surname, date of birth, personal identification number or other unique character sequence assigned to this person for identifying him) shall be entered in the registry and also the reasons for which transactions or Business relationships was terminated in circumstances specified in this paragraph and / or in circumstances related to violations of the procedure for the prevention of terrorist financing.
- The data in the registry shall be recorded in chronological order on the basis of a monetary transaction or transaction according to documents or other legally valid documents related to the execution of monetary transactions or transactions, immediately, but not later than within 3 business days after the execution of a monetary transaction or the conclusion of a transaction except for the case stipulated in paragraph 4, when the data are entered in the registry in chronological order not later than within 7 business days after the occurrence or disclosure of the specified circumstances.
- The Company shall keep a register of:
- DATA RETENTION
- The CEO of the Company is responsible for protecting the data in registries from unauthorized destruction, alteration or use.
- The registry’s data and a copy of the Customer’s or beneficiary’s identity documents, the live video transmission (live streaming) files and other details obtained at the Customer’s identification, accountancy and / or contract documentation (original documents) are kept for 8 years from the end date of transactions or business relations with the Customer.
- Documents and data confirming a monetary transaction or transaction, or other legally valid documents and data related to the execution of monetary operations or the conclusion of transactions shall be kept for 8 years from the date of the monetary transaction or the conclusion of the transaction.
- The correspondence of business relations with the Customer shall be kept for 5 years from the date of the closing date of the transactions or business relations with the Customer in paper form or in electronic form.
- Records of the results of the investigation of complex or unusually large transactions and unusual patterns of transactions specified in Article 17 of the Law shall be stored for 5 years in paper or electronic form.
- The storage period may be extended for a maximum period of 2 years, when there is a motivated reason provided by the competent authority.
- The documents and information referred to shall be stored, regardless of whether the monetary transactions or transactions are domestic or international; business relations with the Customer are ongoing or have expired. Moreover, the documents and information referred to shall be stored in such a way as to enable the recovery of specific monetary transactions or transactions, and to provide the information contained therein, if necessary, to the FCIS or other competent authorities.
- INFORMATION PROTECTION AND RESPONSIBILITY
- Employees of the Company are prohibited from communicating to the Customer or other persons or by other means to let them understand that information about the Customer’s monetary transactions or transactions concluded, or the investigation conducted in relation to them, is submitted to the FCIS or to another supervisory authority. This paragraph of the Rules does not prohibit for the Company to:
- 1.1.Exchange information between financial institutions registered in the territory of the Member States of the European Union as well as those registered in the territory of third countries which are subject to requirements equivalent to those laid down in the Law if these entities belong to the same group of companies;
- 1.2.Exchange information between auditors, accounting or tax advisory services, notaries, notaries representatives and the persons who has the right to perform notarial acts and lawyers and lawyer assistants registered in the territory of the Member States of the European Union and also registered in the territory of third countries subject to requirements equivalent to the requirements set out in the Law if these entities carry out their professional activities as one legal person or as several persons having joint owners and management or as several persons whose activities are subject to general control;
- 1.3.exchange information between financial institutions, auditors, accounting or tax advisory services, notaries, notaries representatives and the persons who has the right to perform notarial acts and lawyers and lawyer assistants in cases involving the same Customer and the same transaction involving two or more of the entities referred to in this paragraph if they are registered in the territory of a Member State of the European Union or in the territory of a third country subject to requirements equivalent to those laid down in the Law and if they belong to the same category of profession and have an equivalent level of professional secrecy and personal data protection.
- In the cases indicated in paragraph 65 of these Rules:
- 2.1.The exchange of information is permitted only to prevent money laundering and / or terrorist financing;
- 2.2.Exceptions to the transmission of the information provided are not valid if a separate decision of the European Commission has been adopted;
- 2.3.When exchanging information with entities registered in third countries and providing personal data to these entities, the provision of personal data must comply with the requirements of the laws protecting personal data.
- The Company or its employees are not liable for the breach of contractual obligations or damage to the Customer if this is due to a monetary operation or a suspension of a transaction.
- Employees of the Company who are willing to notify the FCIS of suspicious monetary transactions or transactions executed by the Customer shall not be held liable.
- Employees of the Company are prohibited from communicating to the Customer or other persons or by other means to let them understand that information about the Customer’s monetary transactions or transactions concluded, or the investigation conducted in relation to them, is submitted to the FCIS or to another supervisory authority. This paragraph of the Rules does not prohibit for the Company to:
- XVI.RESPONSIBILITIES
- The Responsible Employee who carries out the prevention measures specified in the Rules is appointed by the CEO. In cases where a Responsible Employee is unable to perform its tasks, the CEO is considered to be the Responsible Employee.
- The Responsible Employee of the Company is responsible for:
- Managing registries;
- Risk assessment and management;
- Suspension of suspicious transactions or monetary transactions,
- The implementation of measures to prevent money laundering and terrorist financing; and
- Support of communication with FCIS.
- The Responsible Employee of the Company has the opportunity to obtain all information necessary for the performance of his functions, including access to information related to identification of the Customer, his representative and beneficiary, information about the Customer’s knowledge, monetary transactions and transactions, and other information.
- The Responsible Employee of the Company shall promptly respond to requests for information from the FCIS and ensure that this information is provided within 14 business days (if the instructions in some cases specify shorter deadlines for the provision of information to the FCIS, such information must be provided within shorter time limits).
- The Responsible Employee of the Company shall submit a written report at least once a year to the CEO of the Company about the execution of functions related to prevention of money laundering and / or terrorist financing.
- The Responsible Employee of the Company shall familiarise himself and other employees of the Company with these Rules and with the legal acts regulating prevention of money laundering and liability for the failure to comply with measures of prevention of money laundering.
- Other employees who find that the transaction may be suspicious, has detected signs of money laundering and / or terrorist financing shall notify the Responsible Employee of the Company who shall take the necessary steps to investigate the operation and inform the CEO and FCIS if necessary.
- XVII.FINAL PROVISIONS
- These Rules may be amended, supplemented or revoked by decision of the CEO of the Company.
- These Rules shall be reviewed periodically (at least once a year) or upon any substantial events related to the operation of the Company or changes to applicable laws, and shall be amended accordingly to ensure proper implementation of the money laundering and terrorist financing prevention measures, its effectiveness and relevancy. The Responsible Employee is responsible for the timely revision of the Rules and the preparation and submission of draft amendments to the CEO.
- These Rules among the company practical AML practices and procedures shall be reviewed periodically (at least once a year) by an independent evaluator in order to confirm its appropriateness with the provisions of the Law.
- The Company conducts special training for the employees of the Company on issues related to the prevention of money and terrorist financing, as well as the proper implementation of these Rules.
- All employees of the Company shall be familiarized with these Rules by signing it.
ANNEXES:
- Risk Assessment Procedure;
- High-risk jurisdictions;
- Internal SAR form.
- ONLINE IDENTITY & BACKGROUND VERIFICATION
- Employee Due Diligence and Risk Awareness Training
MLRO/Nominated Officer:
Print Name: _____________________ Date:______________ Signed:___________________
Annex No. 1
RISK ASSESSMENT PROCEDURE
Version | Revision Date | Revised by | Section Revised |
This Risk Assessment Procedure (hereinafter – the Procedure) describes the assessment of risk the Company is being exposed to Money Laundering (hereinafter – ML) and / or Terrorism Financing (hereinafter – TF).
ML/TF risks may occur at different stages taking place one after another or all at the same time: (i) illegal funds are introduced into financial system (placement); (ii) layers of transactions are created to hide the origin of the funds (layering); and (iii) a legitimate purpose is created for the criminal proceeds (integration).
Procedure for conducting an anti-money laundering (hereinafter – AML) and counter terrorism financing (hereinafter – CTF) risk assessment
The Company analyses the risks of ML and TF in context with the most important aspects of the business and the workflows of the Company.
The aim of such analysis is to highlight the factors affecting this risk and to analyse in which stage (placement, layering or integration) the Company is most vulnerable.
The Company’s methodology for conducting an AML and CTF risk assessment consists of the following steps:
- Analysis of the regulatory acts related to AML/CTF. The review focuses on recent regulatory enforcements for non-compliance with AML and CTF laws and regulations;
- Quantitative data is gathered from the Company’s business systems such as portfolio data and reviewed with emphasis on changes in the portfolio;
- Permanent communication is conducted between employees of the Company with the aim to identify procedural issues or concerns related to AML/CTF as well as to gather insight as input data for the analysis. Moreover, identification of new products or significant changes in processes and procedures are gathered through intense communication with project managers responsible for any recent relevant projects affecting key processes.
- The risk assessment scoring system represents customer risk by numeric value.
- Current AML/CTF risk assessment is updated based on gathered information. The risk assessment is updated within, at least, the following areas:
- Geography
- Products
- Customers
- Distribution channels
Such areas of risk factors are elaborated below.
The methodology sets a specific number of points for each risk enhancing factor found during the assessment process in the customer lifecycle from onboarding to ongoing account activity.
The total number of points amount to a complete customer risk profile, including Customer Total Risk (CTR). Formed by the total risk enhancing factors. Scoring determines and maintains relative values assigned to each risk factor, enabling for weighted assessment of different risk factors. This, by representing a numerical expression of the impact of a given risk factor on the overall level of risk. Ensuring it is an automated application to accurately assess a customer’s overall risk level.
The total score in the customer’s risk assessment scoring system is 123 points. 99 for standard AML/KYC factors and 24 points from a set of factors unique to virtual currency activity. Customer risk is segmented into five risk criteria as follows:
− Client risk – 32 points;
− National and Geographic Risk – 26 points;
− Risk related to services and products used by the Client – 27 points;
− Service and Product Delivery Channel Risk – 14 points
− Virtual Currency Asset Risk – 24 points
The Client monitoring employees ensures the updating of the Client’s risk profile by applying the Client risk assessment scoring system each time when it is required to carry out due diligence of the Client or apply risk mitigation measures pursuant to the Company regulations or when the Company has obtained (through IT reports, customer service or due diligence, mass media etc.) information concerning the Client, its BO, personal or economic activity.
The Client monitoring employee, based on the risk assessment and the risk profile of the Client (awarded score), determines the necessary due diligence measures and their regularity. The client due diligence measures and their regularity is determined based on the existing level of risk.
The Company updates the numerical score assigned to the risk factors at least once a year or more often, if necessary, if it obtains information that indicates changes in information on which the initial numerical score assigned to the risk factors was based.
RISK FACTORS
Before the implementation of a new Client risk assessment scoring system or significant changes to the existing Client risk assessment scoring system, the Company shall inform the Board in writing.
The Client risk assessment scoring system shall include the following Client identification information:
- Name of the Client;
- Country of registration or Citizenship of the Client
- Declared residency Address or Management location;
- ID number or Registration number of the Client
- Date of establishment or Date of Birth
- Representatives of the Client;
- Beneficial owners of the Client;
- Online website of the Client.
It is recognized that a higher level of due diligence and monitoring would be specified for business areas prone to higher AML risks. Accordingly, entities, their owners, directors whose identities can be easily identified, and transactions implemented by them and large conform to the known profile, may be categorized as low risk.
Further, customers that are liked to pose a higher-than-average risk may be categorized as medium or high risk depending on factors such as background nature and location of activity etc.
All in all, the risk assessment’s scope includes, but is not limited to the type, scale and complexity of the client, the products and services sold, target markets, jurisdiction exposure, distribution channels, transaction size and volumes as compared to historic trends, systems, major organizational changes, and compliance testing, audit and regulatory findings.
The total numerical score assigned to the Client in the Client risk assessment scoring system shall be set according to the risk score indicated below regarding each of the following risk factors:
CLIENT RISK FOR
- Every new customer shall go through the KYC process according to the Rules. Their risk profile is classified as low, medium or high risk for ML/TF based on criteria set out in the Rules.
Customer risk factors which are considered to increase Customer risk are the following:
Risk enhancing factor | Risk score if YES | Risk score if NO |
Client core activity/residing in Lithuania | 0 | 1 |
Client core activity/residing in EEA/EU | 0 | 1 |
Client with core activity/residing outside the Lithuania but is well-known in a foreign group with good reputation | 2 | 0 |
Client with core activity/residing outside the Lithuania and is not a part of a publicly known foreign group with a good reputation | 3 | 0 |
Client or Legal formation, whose BO or representative is a PEP | 2 | 0 |
Legal Entity recognized as a shell company / or Client acting according to nominee agreement | 3 | 0 |
The Client or the BO of the Client, or the representative of the Client is an outsourced accountant, lawyer or provides services for establishing and running legal entities who wishes to conclude a contract with the Company in its name to perform the transactions on behalf of the Client | 2 | 0 |
The activity or source of wealth of the Client or the BO of the Client is related to: gambling; encashment; RE intermediation; cash, marketing services; IT development, FX transactions, trading precious metals, weapons and other activity that is hard to document and trace. | 3 | 0 |
The Client or the BO of the Client is interested in the Company’s assessment policies and procedures or procedures that apply to PEP | 1 | 0 |
The Client or the BO of the Client is a person related to business sector with high risk of corruption | 2 | 0 |
The Client or the BO of the Client is a person related to business sector where cash transactions have an essential role | 2 | 0 |
The reason for the business relationship establishment is unclear and the information on the client and economic purpose of the Client’s activity is general or limited or is not available. | 2 | 0 |
It is suspected that the BO is attempting to hide their identity by using family members or closely associated persons | 2 | 0 |
The previous activity and professional experience of the Client or the BO of the Client is not related to planned economic activity (e.g. no trading history or relations to Virtual currency market(s)) | 2 | 0 |
The economic activity does not correspond to the financial state of the Client or the BO of the Client | 2 | 0 |
The report received regarding the Client indicates that the Client has high MLTF risk | 2 | 0 |
NATIONAL AND GEOGRAPHIC RISK
- When analysing the risk of ML and TF from a geographical perspective the following factors areas considered:
- Negative risk impact factors:
- 1.1.1.If a country is subject of EU sanctions (link – https://www.sanctionsmap.eu/#/main);
- 1.1.2.The country is one of the countries on the list of high risk and other monitored jurisdictions published by the Financial Action Task Force (http://www.fatf-gafi.org/countries/) (such countries are listed in Annex No. 2);
- 1.1.3.The country on the list of third countries with strategic deficiencies in their anti-money laundering and counter-terrorist financing frameworks published by the European Commission (such countries are listed in Annex No. 2);
- 1.1.4.Has a weak or non-existent AML/CTF legislation;
- 1.1.5.Has a high Corruption Perception Index.
- Positive risk impact factors:
- 1.2.1.Is a member of the European Union or the European Economic Area;
- Negative risk impact factors:
- The Company intends to enter into Business relationships only with the Customers who are residing and having citizenship / are registered in the EU Member State or European Economic Area. Thus, the negative factors mentioned in paragraph 1.1.1 will be evaluated upon analysis:
- When analysing the risk of ML and TF from a geographical perspective the following factors areas considered:
Risk enhancing factor | Risk score if YES | Risk score if NO |
The Client, the BO of the Client or the main cooperation partner is related to a country or territory included in the list of low tax and tax-free countries and territories. | 2 | 0 |
The Client, the BO of the Client or the main cooperation partner is related to a country or territory associated with financial or civil restrictions imposed by the UN, USA or the EU. | 2 | 0 |
The Client, the BO of the Client or the main cooperation partner is related to a country or territory which is included in FATF list of non-cooperative countries or regarding which the FATF has issued a statement as a country or territory that has no laws and regulations for the MLTF or where they have significant shortcomings and they do not meet international requirements. | 2 | 0 |
The Client, the BO of the Client or the main cooperation partner is related to a country which is included in the list of states which have been identified as high MLTF risk countries approved by the European Commission. | 4 | 0 |
The Client, the BO of the Client or the main cooperation partner is related to a country where there are significant gaps in the area of MLTF risk prevention. | 4 | 0 |
The Client, the BO of the Client or the main cooperation partner is related to a country with a high level of crime that may result in money laundering. | 3 | 0 |
The Client, the BO of the Client or the main cooperation partner is related to a country or a territory where there are no requirements to submit reports on the financial activities of the company or it is allowed to register a company without specifying the actual location. | 3 | 0 |
The Client, the BO of the Client or the main cooperation partner is related to a country with a high risk of corruption. | 3 | 0 |
The Client, the BO of the Client or the main cooperation partner is related to a country with an unstable political situation. | 3 | 0 |
RISK FACTORS REGARDING THE Products
- The Company offers a limited range of services – crypto-to-crypto and crypto-to-fiat exchange. These products by themselves have limited functionality and are therefore considered to be of a low MT/TF risk.
- The main risk associated is fraud and tax evasion. The Company will take measures to determine the source of fund that the Customer carries out an operation with.
- Overall, given the characteristics of the Company’s products, the Company concludes that the Company’s products imply a low – medium risk of being used for ML/TF purposes.
- Prior to offering any other product, the Company has to evaluate the risks that they pose and assign a risk category to the product. Areas that have to be assessed prior to the assignment of a risk category to a new product include, but are not limited to:
- The level of transparency or opaqueness that the product affords,
- The complexity of the product;
- The value and size of the product
Thus Product risk factors which are considered to increase risk are the following:
Risk enhancing factor | Risk score if YES | Risk score if NO |
The Client uses options for anonymity and international use | 3 | 0 |
The Client has been set/assigned an unusually large transaction limit or unlimited transactions | 3 | 0 |
The Client can carry out the large transactions (more than 10 000 EUR per month) or a large number of orders (more than 10 per month) | 3 | 0 |
The Client can make unusually large cash transactions that are not compatible with its activity | 3 | 0 |
The Client can carry out large, complex transactions (exceeding 10 000 EUR per month) with a large number of parties (more than 3) | 3 | 0 |
The Client has not participated in face-to-face identification | 4 | 0 |
The Client is found through agents without MLTF risk prevention requirements or who are not adequately monitored | 4 | 0 |
The provision of financial services is based on technological solutions which limit the identification of the Client and the information about the personal and economic activity (for example, video identification, ecommerce and its variations) | 4 | 0 |
SERVICE AND PRODUCT DELIVERY CHANNEL RISK FORM:
- All / most of the Company’s distribution channels shall be the Company-owned.
- For the performance of KYC duties, the Company may rely on third-service provider. The customer identity is always verified by electronic means. Therefore, the Company’s main risk lies in non-compliance from agents about the performance of know-your-customer duties. These duties must be regulated in the written agreements with the agents. Furthermore, the process must be followed closely, and the agents should be informed and possibly also trained by the Company in these matters if the process is not being followed.
- As the Company plans to employ identification methods where the Customer is physically present as well as reliable non-face-to-face identification, in this case the distribution channels shall risk shall be considered to be low where the Customer identification is conducted with the Customer being physically present. In cases the Customer’s identity is verified by electronic means, a medium distribution channel risk shall be considered to exist.
Thus further Service and product delivery risks during the transaction cycles:
Risk enhancing factor | Risk score if YES | Risk score if NO |
The monthly credit turnover exceeds the equivalent of 10 000 EUR | 2 | 0 |
The average number of operations per month exceeds 10 | 4 | 0 |
The average amount per operation exceeds 500 EUR | 4 | 0 |
The Client is an association or foundation | 4 | 0 |
VIRTUAL CURRENCY ASSET RISK
Risk enhancing factor | Risk score if YES | Risk score if NO |
The monthly credit turnover exceeds the equivalent of 10 000 EUR | 2 | 0 |
The average number of operations per month exceeds 10 | 4 | 0 |
The average amount per operation exceeds 5,000 EUR | 2 | 0 |
The Client is an association or foundation | 4 | 0 |
The Client risk assessment scoring system shall include the following information:
− The Client’s initial assessment date, name and surname of the Company employee who performed the risk assessment, as well as the resulting Client risk score;
− The date of each further Client’s assessment, name and surname of the Company employee who performed the risk assessment, as well as the resulting Client risk score.
Each assessment score shall be recorded in the Client risk assessment scoring system, as well as printed and signed by the Company employee who performed the risk assessment and added to the Client’s file.
Risk Exposure Appetite
The Company shall terminate the business relationship with the Client if within 30 days after the preconditions for due diligence have been established, the minimum requirements for Client due diligence cannot be met and there is no sufficient evidence to provide the legal and economic purpose of the Client’s transactions.
Client’s risk score assigned in Client risk assessment scoring system upon making the decision on cooperation with the potential Client or the cooperation with the existing Client and:
If the Client’s risk score in the section “Client risk” is at least 8 – the Client is assigned a High-risk Client status and due diligence is applied before establishing cooperation.
If the Client’s risk score in the section “Client risk” is at least 3 – the Client is assigned a Medium-risk Client status and partial due diligence is applied before establishing cooperation.
If the Client’s risk score in the section “National and geographical risk” is at least 4 – the Client is assigned a High-risk Client status and due diligence is applied before establishing cooperation and during the cooperation.
If the Client’s risk score in the section “National and geographical risk” is at least 2 – the Client is assigned a Medium-risk Client status and partial due diligence is applied before establishing cooperation and during the cooperation.
If the Client’s risk score in the section “Risk related to services and products used by the Client” is at least 3 – the Client is assigned a High-risk Client status and due diligence is applied before and during the cooperation.
If the Client’s risk score in the section “Risk related to services and products used by the Client” is at least 2 – the Client is assigned a Medium-risk Client status and partial due diligence is applied before and during the cooperation.
If the Client’s total risk score is at least 10 – the Client is assigned a Medium-risk Client status and partial due diligence is applied before establishing cooperation and during the cooperation.
If the Client’s total risk score is at least 15 – the Client is assigned a High-risk Client status and due diligence is applied, as well as increased monitoring of transactions is carried out;
If the Client’s total risk score is at least 20 – A decision is made not to establish (refuse) cooperation (business relationship) with the potential Client or to terminate the cooperation (business relationship) with the existing Client.
OVERALL ML/TF RISK
The Company estimates that overall the Company faces a medium vulnerability of being used for ML and TF purposes. However, there are risk areas that deserve a more thorough assessment and room to improve the monitoring and mitigation of risks.
To secure an improved risk management, the Company shall take the following actions:
- Securing sufficient Customer knowledge at the point of first contact with new Customers.
- Enhancing awareness and knowledge among staff through renewed training and information sessions by implementing an E-learning solution.
- Periodically reviewing and updating the Procedure.
All stages and aspects of the company-wide money laundering risk assessment are recorded and retained for 8 years after the completed assessment date. Annual risk assessments are completed using new templates so that previous copies can always be referred to and provided to the supervisory authority if requested. The completed risk assessment aims to demonstrate the Company’s commitment to preventing money laundering and terrorist financing and ensures that we are aware of all risks posed to the Company and any areas of vulnerability.
The finalized risk assessment is reviewed and authorized by MLRO
MLRO/Nominated Officer:
Print Name: _____________________ Date:______________
Assessment reviewed: Yes/No Signed:___________________
Annex No. 2
LIST OF THIRD COUNTRIES WHERE MEASURES FOR THE PREVENTION OF MONEY LAUNDERING AND / OR TERRORIST FINANCING ARE NOT APPLICABLE, INSUFFICIENT OR NON-COMPLIANT WITH INTERNATIONAL STANDARDS
The list of third countries is based on the information available to following sources:
- the Financial Action Task Force (“FATF”) at the time of approval of these Rules (link – http://www.fatf-gafi.org/publications/high-risk-and-other-monitored-jurisdictions) and may be supplemented / amended in accordance with relevant FATF decisions.
- https://eur-lex.europa.eu/oj/direct-access.html
- https://www.sanctionsmap.eu/#/main
- https://ec.europa.eu/info/business-economy-euro/banking-and-finance/international-relations/restrictive-measures-sanctions_en
- https://www.un.org/securitycouncil/sanctions/information
- https://www.urm.lt/default/lt/uzsienio-politika/uzsienio-politikos-prioritetai/lietuvos-saugumo-politika/sankcijos
Therefore, the list of prohibited countries in context:
- Albania
- Barbados
- Belarus
- Burkina Faso
- Cambodia
- Cayman Islands
- Cuba
- Haiti
- Jamaica
- Jordan
- Mali
- Malta
- Morocco
- Myanmar
- Nicaragua
- Russian Federation
- Pakistan
- Panama
- Philippines
- Senegal
- South Sudan
- Syria
- Turkey
- Uganda
- Ukraine
- United Arab Emirates
- Yemen
- Croatia
- Bulgaria
Annex No. 3
INTERNAL SUSPICIOUS ACTIVITY REPORT FORM
SAR Reference Number: [number] (MLRO use only)
A record of this Suspicious Activity Report (SAR) will be kept by the MLRO for at least five years.
You must use this form in every case where you know or suspect that another person is engaged in money laundering or terrorist financing or where you have knowledge or suspicion of:
- fraud, including cyber fraud, ransomware, Ponzi scheme, phishing, investment, fake goods;
- involvement of a sanctioned person or wallet;
- sale of illegal goods, e.g. controlled substances, weapons, etc.;
- slavery or human trafficking;
- organised crime group involvement;
- illegal / unlicensed gambling; or
- tax fraud, including VAT.
If you are unsure as to whether you have such a suspicion, please do not use this form but instead seek guidance from the MLRO.
- General (complete all sections)
Date SAR submitted to the MLRO | [date] |
Your name | [name] |
SAR type (money laundering/terrorist financing/fraud/organised crime/other— please state) | [insert SAR type] |
Customer name | [name] |
Customer reference number | [number] |
Department dealing with the matter | [insert details] |
Do you require consent/a defense to continue with the transaction? If yes, set out all the steps that you need to take to complete the transaction where prompted in section 6 below | Yes/No |
Does this SAR relate to a previous SAR? If yes, please provide details | Yes/No [insert details] |
- Details of the main subject of this SAR (complete as much as you are able)
Does this SAR relate to a suspect or a victim? | [insert suspect or victim] |
Is the subject of this SAR: —an individual?—If yes, please go to 3 —a legal entity?—If yes, please go to 4 | [insert individual or entity] |
Are there any individuals or entities who are associated with the main subject? If yes, complete details in 5 | Yes/No |
- Individual
Full name | [name] | |
Date of Birth (dd/mm/yyyy) | [date] | |
Gender | [insert details] | |
Occupation | [insert details] | |
Full address | [insert details] | |
Citizenship | [insert details] | |
Address type (home/business/other) | [insert home/business/other] | |
Is this address current? | Yes/No/Unsure | |
Any other identification details (e.g. passport, driving license or NI number) | [insert details] |
- Legal entity
Full name | [name] |
Company number | [number] |
VAT number | [number] |
Country of registration | [insert details] |
Full address | [insert details] |
Is this address current | Yes/No/Unsure |
Type of business | [insert details] |
Any other identification details | [insert details] |
- Associated subjects (complete if appropriate)
Details of any associated subjects (i.e. people or entities you believe are linked to the main subject above and are involved in the criminal activity), including identifying information as above and details of the nature of the association with the main subject | [insert details] |
- Details of knowledge/suspicion
Does your knowledge or suspicion relate to a specific offence? If yes, please indicate: drugs/fraud/terrorism/bribery/slavery/organised crime/other—please state | Yes/No [insert details] |
Have you discussed your knowledge or suspicions with any person other than the MLRO? If yes, please give details (who/why/when, etc) | Yes/No [insert details] |
What is the nature of the property you suspect is criminal property, if applicable? Money/other property—please state | [insert money/other property] |
Do you know the whereabouts of the property, if applicable? If yes, please provide details (e.g. in the case of money, the account details of where it is held) | Yes/No [insert details] |
Please set out your reasons for making this SAR in as much detail as possible Who/what/where/when/how/why, etc | [insert details] |
Please explain the act(s) involving suspected criminal property that you are seeking consent/a defence for (if applicable) | [insert details] |
Signed and dated (discloser) | [signature and date] |
Signed and dated (MLRO) | [signature and date] |
MLRO/Nominated Officer:
Print Name: _____________________ Date:______________ Signed:___________________
Annex No. 4
ONLINE IDENTITY & BACKGROUND VERIFICATION
International PEP and Sanctions
– Office of Foreign Assets Control
– European Union
– Inter-American Development
– Bank Sanctioned Entities
– World Bank Debarred List
– UN Consolidated List of Sanctions
– UN Security Council Committee
– Country Specific Sanctions Lists
– Saudi Royal Embassy
– SECO Sanctions and Embargos
– Government of Ukraine
– Sanctioned Entities
– India Ministry of Home Affairs
– UK Home Office
Criminal Lists
– Commonwealth of Australia Law
– Central Commission for Discipline Inspection – China
– Hong Kong Police Force
– Central Bureau of Investigation – India
Interpol Wanted List
– Israeli Ministry of Defense
– Royal Malaysian Police
– Philippines National Police
– Ministry of the Interior – Saudi Arabia
– General Police Directorate – Slovenia
– UK National Crime Agency Most Wanted
– Federal Bureau of Investigation Most Wanted – US
– Naval Criminal Investigative Service
– International PEP and Sanctions
– Office of Foreign Assets Control
– European Union
– Inter-American Development
– Bank Sanctioned Entities
– World Bank Debarred List
– UN Consolidated List of Sanctions
– UN Security Council Committee Country Specific Sanctions Lists
– Saudi Royal Embassy
– SECO Sanctions and Embargos
– Government of Ukraine Sanctioned Entities
– India Ministry of Home Affairs
– UK Home Office Criminal Lists
– Commonwealth of Australia Law
– Central Commission for Discipline Inspection – China
– Hong Kong Police Force
– Central Bureau of Investigation – India
– Interpol Wanted List
– Israeli Ministry of Defense
– Royal Malaysian Police
– Philippines National Police
– Ministry of the Interior – Saudi Arabia
– General Police Directorate – Slovenia
– UK National Crime Agency Most Wanted
– Federal Bureau of Investigation Most Wanted – US
– Naval Criminal Investigative Service
– Rewards for Justice —US
– US Army Most Wanted
– US Department of Justice
– US Financial Crimes Enforcement Network
– US Secret Service
– US Department of State
– US Postal Inspection Service
– US Rewards for Justice
Securities Lists
– Australian Securities and Investments Commission
– Department of Foreign Affairs and Trade (DFAT) – Australia
– Alberta Securities Commission – Canada
– British Columbia Securities Commission – Canada
– Investment Industry Regulatory Organization – Canada
– Manitoba Securities Commission – Canada
– Mutual Fund Dealers Association – Canada
– Ontario Securities Commission – Canada
– Securities Commission of Newfoundland and Labrador – Canada
– Securities and Insurance Supervisor – Chile
– China Securities Regulatory Commission
– Cypress Securities and Exchange Commission
– Hellenic Capital Market Commission of Greece
– Securities and Futures Commission – Hong Kong
– Indonesian Central Securities Depository
– National Commission for Companies and the Stock Exchange (Italy)
– Ministry of Economy, Trade and Industry – Japan
– Securities Commission of Malaysia
– Securities and Exchange Commission of Pakistan
– Philippines Securities and Exchange Commission
– Securities Market Agency of Slovenia
– Securities Exchange Commission of Thailand
– New York Stock Exchange – US
– US Court of International Trade
– US Federal Trade Commission
– US National Futures Association
– US Securities and Exchange Commission
Financial Lists
– National Securities Commission – Argentina
– Australian Prudential Regulation Authority
– Reserve Bank of Australia
– Austrian Financial Market Authority
– Central Bank of The Bahamas
– Belgian Financial Services Market Authority
– Central Bank of Belize
– International Financial Services Commission of Belize
– British Virgin Islands Financial Services Commission
– Canadian Office of the Superintendent of Financial Institutions (OSFI)
– Quebec Autorite des marches financiers – Canada
– Saskatchewan Financial Services Commission – Canada
– Cayman Islands Monetary Authority
– People’s Bank of China
– Czech National Bank
– Danish Financial Supervisory Authority
– Finland Financial Supervision Authority
– Autorite des marches financiers – France
– Banque de France, CECEI and Commission Bancaire
– Federal Financial Supervisory Authority (BaFin) of Germany
– Gibraltar Financial Services Commission
– Guernsey Financial Services Commission
– Hong Kong Monetary Authority
– Consumer Defence Association in Hungary
– Reserve Bank of India
– Central Bank of Ireland
– Isle of Man Financial Supervision Commission
– Bank of Israel – Enforcements
– Financial Services Agency – Japan
– Ministry of Finance – Japan
– Jersey Financial Services Commission
– Financial and Capital Market Commission of Latvia
– Bank of Lithuania
– Commission de Surveillance du Secteur Financier – Luxembourg
– Monetary Authority of Macao
– Malta Financial Services Authority
– Financial Services Commission, Mauritius
– Centro Mexicano Para La Filantropia
– De Nederlandsche Bank
– Netherlands Authority for the Financial Markets
– Financial Markets Authority – New Zealand
– Economic and Financial Crimes Commission Warnings – Nigeria
– Financial Supervisory Authority of Norway
– Comision Nacional Supervisora de Empresas Y Valores – Peru
– KNF-Polish Financial Supervision Authority
– Portuguese Securities Market Commission (CMVM)
– Federal Financial Monitoring Service – Russian Federation
– Monetary Authority of Singapore
– National Bank of Slovakia
– Financial Services Board – South Africa
– Comision Nacional del Mercado de Valores – Spain
– Finansinspektionen (Financial Supervisory Authority of Sweden)
– Swiss Financial Market Supervisory Authority
– HM Treasury – UK
– Prudential Regulation Authority – Bank of England UK
– UK Financial Conduct Authority
– Bank of England
– Financial Industry Regulatory Authority – US
– US Bureau of Industry and Security
– US Commodity Futures Trading Commission
– US Federal Deposit Insurance Corporation
– US Federal Reserve Board
– US National Credit Union Administration
– US Office of the Comptroller of the Currency
Annex No. 5
Employee Due Diligence and Risk Awareness Training
The MLR 2017 require us to provide training on money laundering and terrorist financing.
All relevant employees and agents will be:
- made aware of the law relating to money laundering, terrorist financing and data protection; and
- trained regularly (at least every year) on how to recognize and deal with transactions and other activities which may be related to money laundering or terrorist financing.
- Training is provided online https://www.udemy.com/topic/anti-money-laundering/ or through seminars, and appropriate third parties are engaged where relevant.
- Completion of training is compulsory.
- The MLRO will continually monitor training needs but if any employee feel that he need further training on any aspect of the relevant law or our AML/CTF policy and procedures, the MLRO is mandatory to provide the training in particular to:
- Identification and reporting of transactions that must be reported to government authorities
- Examples of different forms of money laundering / terrorist financing involving company products / services.
- Information on internal policies to prevent money laundering / terrorist financing and escalate suspicious activity and red flags.
The MLRO is trained on Quarterly basis participating at FNTT and https://www.lb.lt/en/centre-of-excellence-in-anti-money-laundering organized events, seminars and conferences.
The company shall not collect MLRO training records, however they are a part of MLRO responsibilities on his cooperation agreement and company can request them at any time.