AML refers to the direction of security policy, which has become widespread in many financial services, as it has proven its effectiveness in practice. The peculiarity of the implementation of this policy is that in order to perform certain actions on the Tiptrone portal, the user must pass identification. This is carried out within the framework of the algorithm provided by AML. Only after the completion of all verification procedures, users get access to the functionality of the site.

KYC can be deciphered as Know Your Customer. This means that the company must know its client, for which it is necessary to carry out identification. If a person acts on his own behalf and has a positive reputation, then this significantly increases the level of customer security. The openness of the user and his actions for the company becomes the basis of KYC.

AML stands for Anti-Money Laundering. This involves the use of anti-money laundering measures. The security aspects used during registration and during the activities of users on the site help to minimize and even completely remove the risks of conducting illegal financial activities within the site where such a policy is used.

Based on this, the main tasks of AML / KYC are to create barriers to illegal financial transactions, counter money laundering and allocate money for the work of prohibited organizations. The execution of policy algorithms helps to reduce the risks and harm from user actions that intentionally violate local and international laws.

The cryptocurrency exchange site Tiptrone.com also allows you to exchange electronic funds in different countries and different financial systems. Safe operation on such a large scale requires mandatory compliance with AML/KYC policy rules. The implementation of the policy direction under consideration makes it possible to ensure a high level of service security for all users and minimizes the chance of scammers and other violators appearing here.

Tiptrone is committed to providing access to safe and quality services. In addition, employees monitor the work of users, track non-standard actions, suspicious decisions, and unreasonable transactions. It is worth noting that AML / KYC is a tool recognized by many global companies, so all the tools used here help maintain the stability and security of users of the online service.

It uses a set of measures consistent with international and domestic state standards. They help fight money laundering. Also, the applied protocols contribute to the fight against the following risks:

  • corruption;
  • illegal arms trade;
  • drug trade;
  • human trafficking.

To increase the effectiveness of checks, users are required to undergo an identification procedure. Execution of protocols makes it possible to quickly respond to suspicious transactions of clients, eliminate risks and reduce negative consequences.

The strategy under consideration includes the following factors:

  • employees who control the work of the resource and monitor the actions of customers;
  • risk research and forecasting;
  • personality recognition operations;
  • management of financial transfers.

Control and monitoring of client activities

Tiptrone employees keep track of all the actions that customers perform within the service. It is required to provide conditions under which all users will comply with the conditions of AML / KYC. Employees are required to monitor the implementation of all items by all users without exception. This helps to fully realize the set goals.

Employee powers include:

  • collecting information about customers for their identification;
  • development of AML/KYC policy;
  • formation of algorithms for processing reports and other documents within the framework of laws;
  • monitoring of financial transfers;
  • finding and studying non-standard user actions;
  • formation of schemes for optimizing archival activities;
  • continuous work to improve the quality of the risk assessment system;
  • transfer of the required data to law enforcement agencies.

In addition, the employees of the organization are responsible for the implementation of all AML / KYC items. If an appropriate request is received and there is a court decision, then they cooperate with law enforcement agencies.

Forecasting and risk assessment

The conditions for conducting transactions for the exchange of electronic assets on the site are set by international experience. They fit into the legislation and rules for the security of financial transactions. The purpose of AML / KYC is to support the international fight against money laundering, the financing of terrorist organizations and other illegal activities. To implement all actions, it is necessary to correctly make forecasts, investigate risks, assess their danger, etc. The use of AML / KYC is quite effective. This makes it possible to obtain high results in providing security for services that work with digital assets.

Risk assessment allows you to optimally distribute the available resources aimed at eliminating threats and finding them. As the level of risk increases, the attention of specialists involved in its elimination increases.

The procedure for requesting the passage of identification for the client when working with Tiptrone can be activated if during the verification the e-wallet address was caught in connection with a number of companies:

  • Darknet Marketplace;
  • Darknet Service;
  • Fraudulent Exchange;
  • Illegal Service;
  • mixing service;
  • ransom;
  • scam;
  • Stolen Coins.

If the verification reveals the presence of a direct connection, the exchange process will be frozen. After the verification procedure is completed and upon its positive completion, the funds will be returned to the sender"s details (minus a 10% commission).

Personal identification

The main goal of the company is to comply with international and national laws. Accordingly, a multi-level check is carried out in order to create the most secure conditions for the operation of the resource and the stable activity of users. Clients are required to go through the following levels of verification:

  • the first is checking the email address, which allows you to get an exchange limit of up to 10 thousand dollars;
  • the second is personal identification and verification of the address of residence, which allows you to further increase the limit.

In order to carry out identification of a person with a high level of efficiency, the client needs to transfer documents that will allow him to determine his real name, place of residence and other data. For this, official state documents are used. It is required to transfer electronic copies in good quality, in which all information is well read, there are no retouching and corrections. If suspicions and doubts arise, it may be necessary to present the originals via video link.

All data provided by customers is not disclosed by the administration. They are not transferred to third parties, are not published in open sources and comply with all the rules of the policy of non-disclosure of personal data. Only with an appropriate court decision can data on the operations performed by the client be transferred.

The main requirement for documents: compliance with the state standard, the presence of a serial number, photo, person"s name, date of issue of the document, date of birth. The administration can submit a request to identify the user, which involves the transfer of documents such as:

  • international passport;
  • internal passport;
  • driver license;
  • bank card with user"s photo.

Documents submitted to the company must be transliterated in Latin.

In addition, it is necessary to submit documents that will confirm the place of residence and registration. This is necessary to determine the location of the user, since registration is not open to all regions and countries. This document is valid for up to 3 months. In this case, you can use:

  • rental agreement;
  • utility bills;
  • tax returns.

It should be noted that here also a rather important condition is the transliteration of the required information in Latin.

Tiptrone Administration may conduct new checks, recheck documents already submitted, and verify the authenticity of documents submitted. This is done to update the identification data. The user is obliged to report a change in personal data, including a change of residence. The system conducts a double check of information within the limits of current laws. If it is found that the user has submitted incorrect information, copies are of poor quality, then registration on the service will be denied.

Not only standard checks of new users are carried out, but suspicious activity of already registered users is also monitored. High-quality monitoring of financial transactions will protect customers. If there is any suspicion, the transfer can be frozen, after which checks will begin. If the client has made minor mistakes, then he is given the opportunity to correct everything on his own. For this, a certain time is allocated. If he does not meet the allotted time, then the account will be blocked. For more serious problems, it may be necessary to send a complete set of relevant documents.

Personal information is stored in the archive of the company and is not transferred to third parties. They are for internal use. If the documents transferred by the user do not allow to confirm his identity, then he will not be able to continue to cooperate with the site. If the user is located in areas with high economic risks, access to the site will also be denied.

Translation monitoring

The main source of information about the client is the operation of monitoring and researching transfers made on the site. A study of his other financial activities on the service of the company may also be carried out. The study of financial information is the basic source that allows you to evaluate and make a forecast of existing risks. Accordingly, the organization"s specialists form lists, reports, study translations, analyze them, and find suspicious moments.

Tasks of the surveillance system:

  • document control;
  • formation of archives of translations;
  • study of the purpose of transactions;
  • study of the source of finance;
  • regular identification.

The implementation of the basics of the AML / KYC strategy assumes that the administration of the resource has the right to collect and store personal data of customers, and can process data on completed transfers. This is required to ensure the proper level of protection for customers and maintain a high reputation of the site.

Accordingly, the powers of employees of an organization engaged in this area include:

  • account freezing in case of suspicion of illegal activity;
  • transferring requirements to customers to send additional documents to clarify identification;
  • control of the sending of information, tracking of suspicious activity and notification of law enforcement agencies about it.

Accordingly, the direction of security policy under consideration is a tool successfully used in international practice. With its help, you can quickly and accurately identify a person, monitor ongoing operations and find the most suspicious among them. Proper adherence to the AML / KYC policy algorithm makes it possible to create a significant obstacle to money laundering using a cryptocurrency exchange site, and also makes it impossible to finance terrorist organizations and other anti-social groups in this way.

The duties of the resource include the formation of conditions for the work of users, the preservation of their personal data. If the client deliberately submits incorrect information, then this will not only lead to a denial of registration and subsequent service, but will also entail more serious consequences in the form of law enforcement proceedings.