Pascal Trading is committed to supporting AML/KYC efforts, in principle, we are committed to, amongst other things:
Risk Assessment
We envisage that the majority of our customers would be retail customers, and that we would as of the date of this Policy, be mainly operating in the Cayman Islands.
In this regard, we would:
a. document and/or collect documentation in relationto:
1) the identities of our customers;
2) the countries or jurisdictions that our customers are from or in; and
b. ensure that, to the best of our knowledge, skill and ability, that our customers, connected persons of a customer, natural persons appointedto act on behalf of a customer, beneficial owners of a customer will be assessed and screened with the assistance of List of Designated Individuals and Entities which include categories such as:
Risk Mitigation
If identified, we shall not deal with any persons identified in the List of Designated Individuals and Entities.
We shall be properly advised, in relation to, identifying and assessing the money laundering and terrorism financing risks that may arise in relation to:
We shall especially pay special attention to any new products and new business practices, including new delivery mechanism, and new or developing technologies, that favour anonymity such as digital tokens (whether security, payment and/or utility tokens) that favour anonymity.
We do not open, maintain or accept anonymous accounts or accounts in fictitious names.
We do not establish business relations with, or undertake a transaction for a customer that we have any reasonable grounds to suspect that the assets or funds of a customer are proceeds of drug dealing or criminal conduct. We shall lodge a Suspicious Transaction Report and extend a copy to the relevant Financial Intelligence Unit for such transactions.
We perform Customer Due Diligence:
When we suspect that there are 2 or more transactions are or may be related, linked or the result of a deliberate restructuring of an otherwise single transaction into smaller transactions in order to evade the Prevention of Money Laundering and Countering the Financing of Terrorism measures, we shall treat the transactions as a single transaction and aggregate their values for the purpose of complying with Prevention of Money Laundering and Countering the Financing of Terrorism principles.
Identifying our Customers
We shall identify each of our customers.
To identify our customers, we shall obtain, at least:
AND
Where the customer is a legal person or legal arrangement, we shall apart from obtaining the relevant information as aforesaid above, identify its legal form, constitution and powers that regulate and bind the legal person or legal arrangement; we shall also identify connected parties of it (e.g., directors, partners of and/or persons having executive authority of it, by obtaining at least the following information of each connected party:
Verifying the Identities of our Customers
We shall verify the identities of our customers using reliable, independent source data, documents or information. Where our customer is a legal person or legal arrangement, we shall verify the legal form, proof of existence, constitution and powers that regulate and bind the customer, using reliable, independent source data, documents or information.
Identifying and Verifying the Identities of Natural Persons Appointed to Act on
a Customer’s behalf
Where a customer appoints 1 or more natural persons to act on his behalf in establishing business relations with us, or if the customer is not a natural person we shall:
We shall also verify due authority of each natural person appointed to act on behalf of our customers by obtaining:
Where the customer is a Government entity, we shall only obtain such information as may be required to confirm that the customer is a Government entity as asserted.
Identifying and Verifying Beneficial Owners
We will inquire if there exist any beneficial owners in relation to a customer.
Where there is 1 or more beneficial owner in relation to a customer, we shall identify the beneficial owners and take reasonable measures to verify the identities of the beneficial owners using relevant information or data obtained from reliable, independent sources. We shall:
if the customer is a legal person –
if the customer is a legal arrangement –
Where our customer is not natural person, we shall identify the nature of our customers’ business, its ownership and control structure.
We shall be required if there exist any beneficial owners for customers who are:
unless we have doubts about the veracity of the CDD information, or suspect that our customers, business relations with, or transactions for the customer, may be connected with money laundering or terrorism financing.
We shall also document the basis for our determination.
Information on the Purpose and Intended Nature of Business Relations and Transaction Undertaken without an Account being Opened*
We shall, when processing the application to establish business relations or undertake transactions without being opened, understand and as appropriate, obtain from the customer information as to the purpose and intended nature of business relations or transaction.
Review of Transactions Undertaken without an Account being Opened*
Where we undertake one or more transactions for a customer without an account being opened (“current transaction”), we shall review the earlier transactions undertaken by that customer to ensure that the current transaction is consistent with our knowledge of the customer, its business and risk profile and where appropriate, the source of funds.
Where we establish business relations with a customer, the payment service provider shall review any transaction undertaken before the business relations are established, to ensure that the business relations are consistent with our knowledge of the customer, its business and risk profile and where appropriate, the source of funds.
We shall pay special attention to all complex, unusually large or unusual patterns of transactions undertaken without an account being opened that have no apparent or visible economic or lawful purpose. We shall, to the extent possible, inquire into the background and purpose of the aforesaid transactions and document its findings with a view to making this information available to the relevant authorities should the need arise.
For the purposes of reviewing transactions undertaken without an account being opened, we shall put in place and implement adequate systems and processes, commensurate with the size and complexity of the payment service provider to:
Where there are any reasonable grounds for suspicion that a transaction for a customer undertaken without an account being opened is connected with money laundering or terrorism financing, and where we consider it appropriate to undertake the transaction, the payment service provider shall substantiate and document the reasons for undertaking the transaction.
Ongoing Monitoring
We shall monitor business relations with our customers on an ongoing basis. We shall, during the course of business relations with a customer, observe the conduct of the customer’s account and scrutinise transactions undertaken throughout the course of business relations, to ensure that the transactions are consistent with our knowledge of the customer, its business and risk profile and where appropriate, the source of funds.
We shall perform our risk mitigation measures where the transaction involves a transfer of digital payment token to or receipt of a digital payment token from an entity other than:
We shall pay special attention to all complex, unusually large or unusual patterns of transactions, undertaken throughout the course of business relations, that have no apparent or visible economic or lawful purpose. We shall, to the extent possible, inquire into the background and purpose of the aforesaid transactions and document its findings with a view to making this information available to the relevant authorities should the need arise.
For the purposes of ongoing monitoring, we shall put in place and implement adequate systems and processes, commensurate with the size and complexity of the payment service provider to:
We shall ensure that the CDD data, documents and information obtained in respect of customers, natural persons appointed to act on behalf of the customers, connected parties of the customers and beneficial owners of the customers, are relevant and kept up-to-date by undertaking reviews of existing CDD data, documents and information, particularly for higher risk categories of customers.
Where there are any reasonable grounds for suspicion that existing business relations with a customer are connected with money laundering or terrorism financing, and where we consider it appropriate to retain the customer:
Where we assess the customer or the business relations with the customer to be of higher risk, the payment service provider shall perform enhanced CDD measures, which shall include obtaining the approval of our senior management to retain the customer.
CDD Measures for Non-Face-to-Face Business Relations or Non-Face-to- Face Transactions Undertaken without an Account Being Opened*
We shall develop policies and procedures to address any specific risks associated with non-face-to-face business relations with a customer or nonface-to-face transactions undertaken without an account being opened for a customer (“non-face-to-face business contact”).
We shall implement the policies and procedures when establishing business relations with a customer and when conducting ongoing due diligence.
Where there is no face-to-face contact, the payment service provider shall perform CDD measures that are at least as stringent as those that would be required to be performed if there was face-to-face contact.
Where a payment service provider conducts its first non-face-to-face business contact, the payment service provider shall, at his or its own expense, appoint an external auditor or an independent qualified consultant to assess the effectiveness of the policies and procedures, including the effectiveness of any technology solutions used to manage impersonation risks.
We shall appoint an external auditor or an independent qualified consultant to carry out an assessment of the new policies and procedures, and shall submit the report of the assessment to the Authority no later than one year after the implementation of the change in policies and procedures.
Reliance by Acquiring Payment Service Provider on Measures Already Performed
When we (“acquiring payment service provider”) acquires, either in whole or in part, the business of another payment service provider, we shall perform the measures on the customers acquired with the business at the time of acquisition except where the acquiring payment service provider has:
Measures for Non-Account Holder*
If we undertake any transaction for any customer who does not otherwise have business relations with us, we shall:
Timing for Verification
We shall complete verification of the identity of a customer, natural persons appointed to act on behalf of the customer and beneficial owners of the customer before:
We provider may establish business relations with a customer before completing the verification of the identity of the customer, natural persons appointed to act on behalf of the customer and beneficial owners of the customer if:
Where we establish business relations with a customer before verifying the identity of the customer, natural persons appointed to act on behalf of the customer, and beneficial owners of the customer, we shall:
Where Measures are Not Completed
Where we are unable to complete the measures as required, we shall not commence or continue business relations with any customer, or undertake any transaction for any customer.
Where we are unable to complete the measures, the payment service provider shall consider if the circumstances are suspicious so as to warrant the filing of an STR.
Completion of the measures means the situation where the payment service provider has obtained, screened and verified (including by delayed verification as allowed under paragraphs 6.43 and 6.44) all necessary CDD information under paragraphs 6, 7 and 8, and where the payment service provider has received satisfactory responses to all inquiries in relation to such necessary CDD information.
Joint Accounts
In the case of a joint account, we shall perform CDD measures on all of the joint account holders as if each of them were individually customers of the payment service provider.
Screening
We shall screen a customer, natural persons appointed to act on behalf of the customer, connected parties of the customer and beneficial owners of the customer against relevant money laundering and terrorism financing information sources, as well as lists and information provided by the Authority for the purposes of determining if there are any money laundering or terrorism financing risks in relation to the customer.
We shall screen the persons:
We shall screen all value transfer originators and value transfer beneficiaries, against lists and information provided by the Authority for the purposes of determining if there are any money laundering or terrorism financing risks.
We shall document the results of all screening.
Politically Exposed Persons
We shall use all reasonable means to determine if a customer, any natural person appointed to act on behalf of a customer, any connected party of the customer or any beneficial owner of the customer is a politically exposed person, or a family member or close associate of a politically exposed person.
We shall, in addition to performing CDD measures, perform at least the following enhanced due diligence measures where a customer or any beneficial owner of the customer is determined by us to be a politically exposed person, or a family member or close associate of a politically exposed person:
Higher Risk Categories
We recognise that the following circumstances where a customer presents or may present a higher risk for money laundering or terrorism financing include but are not limited to the following:
We will perform enhanced CDD for customer who presents a higher risk for money laundering or terrorism financing or any customer the Authority notify to us as presenting higher risk for money laundering and terrorism financing.
If we are the ordering institution, before effecting a value transfer, we shall:
If we are an ordering institution, we shall include in the message or payment instructions that accompanies or relates to the value transfer:
Value Transfers Exceeding a particular threshold
For value transfer exceeding a particular threshold and if we are an ordering institution, we shall identify the value transfer originator and verify his or its identity, include in the message or payment instructions that accompanies or relates to the value transfer information and any of the following:
We shall immediately and securely submit to the beneficiary institution all value transfer originator and value transfer beneficiary information, and shall document all such information. Where we in the capacity as an ordering institution are not able to comply with the requirements, we shall not execute the value transfer.
If we are the beneficiary institution, we shall take reasonable measures to identify value transfers that lack the required value transfer originator or required value transfer beneficiary institution.
For value transfers where we as the beneficiary institution pays out transferred digital payment token(s) in cash or cash equivalent to a value transfer beneficiary, we shall identify and verify the identity of the value transfer beneficiary (if the identity has not been previously verified).
We shall always conduct a review prior to executing a value transfer lacking the required value transfer originator or value transfer beneficiary information, and document our follow-up action.*
If we are the intermediary institution, we shall retain all information pertaining to a value transfer.
When we as an intermediary institution effect a value transfer to another intermediary institution or beneficiary institution, we shall immediately and securely provide the information accompanying the value transfer, to that other intermediary institution or beneficiary institution.
If we are a receiving intermediary institution, we shall keep a record for at least five years for all information received from an ordering institution or another intermediary institution.
We shall take reasonable measures to identify value transfers that lack the required value transfer originator or value transfer beneficiary information when straight-through processing.
Amongst other things, we shall appoint an AML/CFT Compliance Officer at the Management Level, maintain an independent audit function, and take proactive measures in regularly training our employees and employees on AML/CFT matters.
Enterprise-wide money-laundering/terrorism financing risk assessment
We will employ and enterprise-wide money-laundering/terrorism financing risk assessment in 3 phases:
Phase 1: Assessing inherent risk
We will assess the inherent risk in relation to our:
Phase 2: Assessing mitigating control
We will assess our mitigating controls in relation the aforesaid, any and/or all customer(s) whom we find suspicious will be first monitored, followed by exercising enhanced due diligence.
Phase 3: Assessing residual risk
We will assess our residual risks after assessing our mitigating controls.
Customer Services: support@pascaltrading.com