Transaction Monitoring (Travel Rule) Policy
Introduction
The Transaction Monitoring policy of underscores the company's dedication to combating money laundering, terrorism financing, proliferation financing, financing for weapons of mass destruction (WMDs) and related illicit activities. It outlines the measures implemented to prevent users from exploiting its services for criminal purposes, aligning with the recommendations of the Financial Action Task Force (FATF) and other relevant regulations of Singapore in compliance with the guidelines of the Monetary Authority of Singapore (MAS). has developed this policy to ensure trading transparency and to safeguard against terrorism financing and unlawful practices.
In this Policy “we”, “us”, “our” means and the terms “user”, “individuals”, “non-individuals” means the residents of Singapore and the business enterprises registered in Singapore under Companies Act, 1967 where the users of PayBiroPro reside and operate.
The Transaction Monitoring Policy is uniformly applicable to all Users intending to utilize the Services or gain advantages from the Online Platforms
of , constituting an integral element of the User Terms and Conditions. Before engaging with the Online Platforms or divulging any personal information, it's imperative to thoroughly examine this Transaction Monitoring Policy. Your use of the Online Platforms implies your explicit acknowledgment and adherence to the User Terms and Conditions and, consequently, this Transaction Monitoring Policy.
Purpose
The purpose of this policy is to set out how is complying with the relevant laws of Singapore where is carrying out the business and operation. follows the procedures of transaction monitoring mentioned in this policy for the purpose of mitigating the Money Laundering (ML) / Terrorist Financing (TF) risks.
has designed a set of Transaction Monitoring (TM) rules which are implemented to recognize / identify abnormal or suspicious transactions. This policy demonstrates how performs ongoing monitoring of the activities of the users of .
Some of the actions of the users require pre-approval or permissions on some transactions to reduce the potential risk which might arise from ’s services and products.
Roles and Responsibility
acts as Cryptoasset Exchange Provider which facilitates the customers with a variety of services. Keeping in mind the risks of the nature of the business has some responsibilities in regards to the Financial Action Task Force (FATF) recommendations and mandates and the guidelines of the Monetary Authority of Singapore (MAS), ensuring that the individuals / non-individuals are restricted from exploiting the services provided by .
For the purpose of monitoring the transactions made by the customers, has different teams with different roles and responsibilities which are as follows:
- The Cybersecurity Team: the cybersecurity team of has been given the responsibility of designing a robust system of platforms to monitor the transactions made by the customers and all the activities of the user of the services provided by .
- Investigators: the investigators have the responsibility to review the reports generated as well as review the alerts triggered by the system of . The investigators shall determine the appropriate course of
action after the review, which is to be taken. For an instance, the transaction having the potential of being a high-risk transaction, the investigators shall approve the customer’s transaction order or escalate the matter to the compliance department.
- The Head of Compliance: the head of the compliance department is the Money Laundering Reporting Officer (MLRO) and it is the duty / responsibility of the officer to regularly review this policy and consider its accuracy and appropriateness. It is also the responsibility of the MLRO to provide support and advice to other teams timely and appropriately. In the event of any suspicious activity / transactions the MLRO shall file a Suspicious Transaction Report (STR) or a Suspicious Activity Report (SAR) to the regulatory authority, being the Monetary Authority of Singapore (MAS).
Continuous Monitoring
Provided that suspicious activities are not easily detected within a short period of time, follows the rule of continuous monitoring of the accounts
/ activities / transactions to understand the behaviour of the customers. This procedure makes it easier to detect unusual activities / transactions.
The customers who have a higher transaction volume or frequency shall be reviewed monthly or quarterly according to the degree of the transaction to ensure the consistency to the KYC / CDD profiling.
Watch List
utilises an unique feature of Watch List to monitor transactions of specific customers to mitigate the Money Laundering (ML) / Terrorist Financing (TF) risks, arising from abnormal activities from the customer’s / user’s account.
Once the KYC team of approves a customer for availing the services provided by , the individual / non-individual are enlisted on the Watch List for the purpose of continuous monitoring / identification of the behaviours that points towards the association with potentially higher risky activities.
periodically monitors the transactions of the customers who are enlisted on the Watch List, and the investigators make a record after completing each transaction monitoring review.
Upon identification of the high risk factors, further classifies the customers enlisted on the Watch List, into three levels for the purpose of reviewing the activities in accordance with the rules below respectively:
- LEVEL A: Customers having more than two high risk factors (such as PEPs, adverse media and high risk industries), or upon finding some unusual transactions has the discretion to review the transactions made by the customer and for the Level A customers post transactions reviews are made per week.
- LEVEL B: Customers having two high risk factors (such as PEPs, adverse media), their transactions are reviewed per month.
- LEVEL C: Customers having one high risk factor (working in a high risk industry), their transactions are reviewed quarter.
For further information of the investigation process and Suspicious Activity Report (SAR), please refer to respective points below.
might exclude a customer from the Watch List on an exception basis or have their level of monitoring downgraded, provided that if there are no alerts triggered, or no abnormal / unusual activities are found within a span of more than 12-18 months and the approval is given from both the Head of the compliance and CEO.
Purposes of Red Flags
For the purpose of preventing the misuse of Virtual Assets and funds for committing financial crimes and terrorism funding, implements the transaction monitoring rules which are designed in such a manner where developing the red flags indicators helps strengthen the control in accordance with the detection targets below:
- Monitoring the transactions which have an unexpected higher value (pecuniary value) or where the frequency of the transactions are very frequent, without a justifiable reason.
- Preventing any individual from using ’s services or product on behalf of another principal.
- Detecting unusual login where the IP addresses are inconsistent without any justifiable reason.
- Identifying transactions from sanctioned and high-risk countries imposed by the UN, EU, FATF, OFAC, HMT;
- Identifying high risk Virtual Assets Service Providers (VASP) and E-
Red Flags Categories
has designed the red flags into two categories:
- Transaction based triggers: this red flag category is based on the transaction timing, either pre-transaction, real-time, and post- transaction (e.g., monthly accumulated trading volume).
- Non transaction based triggers: this red flag category is based on all other factors, including but not limited to multiple IP addresses a user uses within a short period, the type crypto or fiat used in a transaction.
Investigation Process
has investigators who were given the responsibility to initiate the investigation process while any alerts of any suspicious activities are triggered.
Pre-approval of the investigator or any equivalent role is required before taking any actions, if the activity / transaction is found out that the activity / transaction has a risk factor.
The investigator in charge is responsible for reviewing the alerts triggered and taking immediate action as it deems fit by the investigator. If an alert is triggered, the investigator is responsible for evaluating whether the activity /
transaction is indeed a suspicious activity / transaction and take actions pursuant to the case as necessary. For instance:
- Checking the profile of the customer in the
- Referring to the transaction history in the
- Communicating with the sales department or an employee who knows the customer.
- Collecting more information or documents from the customer via the KYC team.
An investigation report shall be made by the investigator if the dispute / issue cannot be resolved within a reasonable time frame. The investigator shall input the actions to be taken into the report and provide relevant information and supporting documents to the Head of the Compliance department.
If the system has triggered any alert and the issue cannot be resolved within a reasonable time then the customer has to go through the Re- KYC / CDD procedure as mentioned in KYC / CDD policy.
For further information, kindly refer to the KYC / CDD policy.
Suspicious Activity
To comply with the requirements of Anti Money Laundering (AML) / Counter Terrorism Financing (CTF), all the employees of shall report to the Head of Compliance or the immediate line manager upon finding any suspicious activity.
Activities below-mentioned are not exhaustive but shows suspicious situations:
- Transactions made by the customers which are unusual and unexpected in comparison with the previous trading volumes, especially in previously dormant accounts.
- Transaction amounts that are not commensurate with the evidence of wealth provided by customers.
- IP address which shows that the customer has logged in from various countries within a short period.
While the investigator of detects any suspicious activity, taking appropriate action accordingly is the duty of the investigators. It is also the responsibility of the investigator to provide relevant information and supporting documentation shall be provided to the Head of the Compliance department to determine what appropriate actions could be taken against the unusual activity / transactions.
Filing a Suspicious Activity Report (SAR) to the regulatory authority being the MAS is required when the Head of Compliance department determines the dispute / issue of suspicious activity can not be resolved.
For further information / details, kindly refer to the Suspicious Activity Report (“SAR”) Procedure.
Travel rule
always makes sure that the transactions that are happening on the portal are legal transactions. As per the regulation, the Travel Rule for crypto assets states that any crypto transaction that crosses a certain threshold must be accompanied by the personal information of the customer. follows the travel rule regulations for every transaction that happens on the platform. Additionally, screens the counterparty customer, and
performs due diligence on the counterparty VASP. takes time to understand and prepare to abide by these regulations or run the risk of losing their operational licences.
Travel rule questions
It is the responsibility of to look into the legality of transactions, hence some questions are being asked to the customers before completing the transaction. The questions which are being asked are as follows:
- Sending crypto-currency to other addresses:
- Whether the transfer is happening to the own account of the customer or not?
- Whether the recipient is an individual or a company?
- The recipient’s first name as well as the last name shall be given by the customer which is a mandate before completing the transactions.
- The account number / customer number / unique identifier / of the recipient in the exchange or wallet, where or to whom the customer is making the transaction.
- The email address of the crypto firm is demanded by where the recipient holds the account.
- Lastly, the customer has to agree to the terms and conditions box, which leads to sharing of the personal information, including full name, national identification, physical address, etc. with the receiving exchange, in free will and consent for availing the services of .
- Receiving crypto-currency from other addresses:
- Whether the transfer is happening from the own account of the customer or not?
- Whether the originator or sender is an individual or a company?
- The recipient’s first name as well as the last name shall be given by the customer which is a mandate before completing the transactions.
- The account number / customer number / unique identifier / of the originator in the exchange or wallet, where or from whom the customer is making the transaction.
- asks for the originator’s address or passport or government issued national identification number or date and place of birth as registered on the originating exchange or wallet.
- The email address of the originator’s crypto firm is demanded by where the sender holds the account.
- Lastly, the customer has to agree to the terms and conditions box, which leads to sharing of the personal information, including full name, national identification, physical address, etc. with the receiving exchange, in free will and consent for availing the services of .
Changes to this Privacy Policy
updates its privacy policy from time to time. Any changes whatsoever shall be notified to the customers of by posting the new Privacy Policy on this page. The customers are advised to review this
Privacy Policy periodically for any changes. Changes to this Privacy Policy are effective when they are posted on this page on the Website.
Contact
For any query about this Policy, the contact information is given below:
- By visiting this page on the website: [.com]
- By sending an email: [compliance@.com]