Updated as of 7 June 2014.
Our firm is committed to the highest standards of the Anti-Money Laundering (AML) compliance and Anti-Terrorist Financing and requires the management, and employees to follow the named standards.
Money laundering – the process of converting funds, received from illegal activities (such as fraud, corruption, terrorism, etc.), into other funds or investments that look legitimate to hide or distort the real source of funds.
The process of money laundering can be divided into three sequential stages:
Our firm, like most companies providing services on the financial market, adheres to the principles of Anti-Money Laundering and actively prevents any actions that aim or facilitate the process of legalizing of illegally gained funds. AML policy means preventing the use of the company's services by criminals, with the aim of money laundering, terrorist financing or other criminal activity.
For this purpose, a strict policy on the detection, prevention and warning of the corresponding bodies of any suspicious activities was introduced by the company. Moreover, we have no right to report clients that the law enforcement bodies are informed on their activity. A complex electronic system for identifying every company's client and conducting a detailed history of all operations was introduced as well.
To prevent money laundering, we neither accept nor pay cash under any circumstances. The company reserves the right to suspend any client's operation, which can be regarded as illegal or, may be related to money laundering in the opinion of the staff.
We will make sure that it is dealing with a real person or legal entity. We also perform all the required measures in accordance with applicable law and regulations, issued by monetary authorities. The AML policy is being fulfilled within our means of the following:
Because of the company's commitment to the AML and KYC policies, each client of the company has to finish a verification procedure. Before we start any cooperation with the client, the company ensures that satisfactory evidence is produced or such other measures that will produce satisfactory evidence of the identity of any customer or counterparty are taken. The company as well applies heightened scrutiny to clients, who are residents of other countries, identified by credible sources as countries, having inadequate AML standards or that may represent a high risk for crime and corruption and to beneficial owners who resides in and whose funds are sourced from named countries.
During the process of registration, each client provides personal information, specifically: full name; date of birth; origin; complete address, including phone number and city code. A client sends the following documents (in case the documents are written in non-Latin characters: to avoid any delays in the verification process, it is necessary to provide a notarized translation of the document in English) because of the requirements of KYC and to confirm the indicated information:
In case the applicant company is listed on a recognised or approved stock exchange or when there is independent evidence to show that the applicant is a wholly owned subsidiary or a subsidiary under the control of such a company, no further steps to verify identity will normally be required. In case the company is unquoted and none of the principal directors or shareholders already has an account with us, the official provides the following documents because of the requirements of KYC:
This procedure is performed to establish the identity of the client and to help us know/understand the clients and their financial dealings to be able to provide the best services of online trading.
In addition to gathering information from the clients, we continue to monitor the activity of every client to identify and prevent any suspicious transactions. A suspicious transaction is known as a transaction that is inconsistent with the client's legitimate business or the usual client's transaction history known from client activity monitoring. We have implemented the system of monitoring the named transactions (both automatic and, if needed, manual) to prevent using the company's services by criminals.
All the clients' operations to deposit and withdraw funds have the following requirements: