🚀 Elite Crypto Traders Only Scale to $5M trading crypto with 80% profit splits & no time limits

Start Now

AML & KYC Policy

Anti-Money Laundering and Know Your Customer compliance procedures for Excellence Traders Limited

COMPLIANCE COMMITMENT

Excellence Traders Limited is committed to maintaining the highest standards of compliance with anti-money laundering (AML) and know your customer (KYC) regulations. We implement robust procedures to prevent financial crime and ensure regulatory compliance.

Policy Version

v4.1

Last Updated

June 30, 2025

Next Review

December 2025

1. Policy Overview and Objectives

1.1 Purpose and Scope

This Anti-Money Laundering (AML) and Know Your Customer (KYC) Policy establishes the framework for Excellence Traders Limited to:

  • Prevent money laundering and terrorist financing activities
  • Comply with applicable AML/CTF laws and regulations
  • Verify the identity of all clients and beneficial owners
  • Monitor and report suspicious transactions
  • Maintain comprehensive records and documentation

1.2 Regulatory Framework

Our AML/KYC program is designed to comply with:

  • Financial Action Task Force (FATF) recommendations
  • Local anti-money laundering legislation
  • Counter-terrorism financing regulations
  • International sanctions and embargo requirements
  • Industry-specific regulatory guidance

1.3 Risk-Based Approach

We implement a risk-based approach that considers:

  • Client risk profiles and geographic locations
  • Product and service risk assessments
  • Transaction patterns and behavior analysis
  • Delivery channel and technology risks
  • Ongoing monitoring and review processes

2. Customer Identification Program (CIP)

2.1 Identity Verification Requirements

All clients must provide the following documentation for identity verification:

Individual Clients

  • • Government-issued photo ID (passport, driver's license, national ID)
  • • Proof of address (utility bill, bank statement, government correspondence)
  • • Proof of income or financial standing (bank statements, employment letter)
  • • Additional documentation as required by risk assessment

Corporate Clients

  • • Certificate of incorporation or equivalent
  • • Memorandum and articles of association
  • • Register of directors and shareholders
  • • Beneficial ownership information
  • • Authorized signatory documentation

2.2 Document Verification Process

Our verification process includes:

  • Document Authentication: Verification of document legitimacy and validity
  • Data Cross-Referencing: Comparison against reliable data sources
  • Biometric Verification: Advanced identity verification where applicable
  • Address Verification: Confirmation of residential or business address
  • Third-Party Validation: Use of approved verification service providers

2.3 Acceptable Documentation Standards

All submitted documents must meet the following criteria:

  • Original documents or certified copies
  • Clear, legible, and unaltered
  • Current and within validity periods
  • Issued by recognized authorities
  • In English or with certified translations

3. Enhanced Due Diligence (EDD)

3.1 High-Risk Client Categories

Enhanced due diligence is required for the following client categories:

Risk Category Examples Additional Requirements
Politically Exposed Persons (PEPs) Government officials, senior executives Source of wealth verification
High-Risk Jurisdictions FATF blacklisted countries Enhanced monitoring
Complex Ownership Trusts, foundations, shell companies Beneficial ownership disclosure
Cash-Intensive Businesses Money exchange, gambling Business verification

3.2 Source of Funds and Wealth

For high-risk clients, we require detailed information about:

  • Source of Funds: Origin of specific funds used for trading
  • Source of Wealth: Overall wealth accumulation and sources
  • Business Activities: Nature and legitimacy of business operations
  • Financial History: Previous trading experience and financial background
  • Purpose of Relationship: Intended use of our services

3.3 Ongoing Enhanced Monitoring

High-risk clients are subject to:

  • More frequent periodic reviews (quarterly vs. annual)
  • Lower transaction monitoring thresholds
  • Senior management approval for account opening
  • Enhanced transaction analysis and reporting
  • Regular update of risk assessments

4. Sanctions and Prohibited Persons Screening

4.1 Sanctions Lists Monitoring

We screen all clients against the following sanctions lists:

  • UN Security Council: United Nations sanctions lists
  • OFAC: Office of Foreign Assets Control (US) sanctions
  • EU Sanctions: European Union restrictive measures
  • National Lists: Local government sanctions and restrictions
  • PEPs Lists: Politically exposed persons databases

4.2 Screening Procedures

Our screening process includes:

  • Real-Time Screening: Automated screening during onboarding
  • Ongoing Monitoring: Regular re-screening against updated lists
  • Fuzzy Logic Matching: Advanced name matching algorithms
  • Manual Review: Human verification of potential matches
  • Documentation: Comprehensive records of screening results

4.3 Prohibited Jurisdictions

We do not provide services to residents of the following jurisdictions:

High-Risk Countries

  • • North Korea
  • • Iran
  • • Syria
  • • Afghanistan

Restricted Regions

  • • Crimea
  • • Donetsk
  • • Luhansk
  • • Gaza Strip

FATF Listed

  • • Myanmar
  • • Countries under enhanced monitoring
  • • Updated as per FATF guidance

5. Transaction Monitoring and Reporting

5.1 Automated Monitoring Systems

We employ sophisticated monitoring systems to detect:

  • Unusual Trading Patterns: Abnormal trading behavior or frequencies
  • Large Transactions: Transactions exceeding predetermined thresholds
  • Rapid Movements: Quick deposits and withdrawals
  • Structuring Activities: Attempts to avoid reporting thresholds
  • Geographic Anomalies: Transactions from unexpected locations

5.2 Suspicious Activity Indicators

Red flags that may trigger enhanced scrutiny include:

Behavioral Indicators

  • • Reluctance to provide identification
  • • Inconsistent or evasive responses
  • • Unusual urgency in transactions
  • • Requests for excessive secrecy
  • • Knowledge gaps about trading

Transaction Indicators

  • • Round-number transactions
  • • Unusual funding sources
  • • Rapid profit withdrawals
  • • Complex transaction structures
  • • Third-party funding

5.3 Reporting Procedures

When suspicious activity is identified, we:

  1. Conduct internal investigation and analysis
  2. Document findings and supporting evidence
  3. File Suspicious Activity Reports (SARs) with authorities
  4. Maintain strict confidentiality throughout the process
  5. Provide ongoing cooperation with law enforcement

6. Record Keeping and Data Management

6.1 Record Retention Requirements

We maintain comprehensive records for the following minimum periods:

Record Type Retention Period Storage Requirements
Client identification documents 5 years after account closure Secure digital storage
Transaction records 5 years from transaction date Encrypted database
Suspicious activity reports 5 years from filing date Restricted access archive
Compliance documentation 7 years minimum Compliance file system

6.2 Data Security Measures

We implement robust security measures to protect client data:

  • Encryption: End-to-end encryption for data transmission and storage
  • Access Controls: Role-based access with multi-factor authentication
  • Audit Trails: Comprehensive logging of all data access and modifications
  • Backup Systems: Regular backups with offsite storage
  • Incident Response: Procedures for data breach management

6.3 Data Privacy Compliance

Our data management practices comply with:

  • General Data Protection Regulation (GDPR)
  • Local data protection laws
  • Cross-border data transfer regulations
  • Industry-specific privacy requirements
  • Client confidentiality obligations

7. Staff Training and Responsibilities

7.1 Training Program

All staff members receive comprehensive AML/KYC training covering:

  • Regulatory Requirements: Current AML/CTF laws and regulations
  • Risk Assessment: Identification and evaluation of money laundering risks
  • Red Flag Recognition: Detection of suspicious activities and behaviors
  • Reporting Procedures: Proper escalation and reporting protocols
  • Customer Due Diligence: Verification and ongoing monitoring procedures

7.2 Roles and Responsibilities

Compliance Officer

  • • Overall AML/KYC program oversight
  • • Regulatory reporting and liaison
  • • Policy development and updates
  • • Staff training coordination
  • • Audit and examination support

Front-Office Staff

  • • Client onboarding and verification
  • • Initial risk assessment
  • • Suspicious activity detection
  • • Documentation collection
  • • Escalation of concerns

7.3 Ongoing Professional Development

Our commitment to compliance excellence includes:

  • Annual refresher training for all staff
  • Specialized training for compliance personnel
  • Industry conference participation
  • Professional certification support
  • Regular policy and procedure updates

8. Client Cooperation and Obligations

8.1 Client Responsibilities

All clients are required to:

  • Provide Accurate Information: Complete and truthful personal and financial information
  • Submit Required Documentation: All requested identification and verification documents
  • Notify Changes: Promptly report any changes in circumstances
  • Cooperate with Reviews: Assist with periodic account reviews and updates
  • Source of Funds Declaration: Provide evidence of legitimate fund sources when requested

8.2 Ongoing Obligations

Clients must continuously:

  • Maintain current and accurate account information
  • Respond promptly to information requests
  • Report suspicious activities they become aware of
  • Comply with all applicable laws and regulations
  • Authorize necessary information sharing with authorities

8.3 Consequences of Non-Compliance

Failure to comply with AML/KYC requirements may result in:

  • Account restrictions or limitations
  • Enhanced monitoring and scrutiny
  • Suspension of services
  • Account termination
  • Reporting to regulatory authorities

9. Policy Review and Updates

9.1 Regular Review Schedule

This policy is subject to:

  • Annual Reviews: Comprehensive annual policy assessment
  • Regulatory Updates: Immediate updates for regulatory changes
  • Risk Assessment Updates: Reviews following risk assessment changes
  • Incident-Driven Reviews: Updates following significant incidents
  • Best Practice Integration: Incorporation of industry best practices

9.2 Stakeholder Involvement

Policy updates involve:

  • Senior management approval
  • Legal and compliance review
  • Operational impact assessment
  • Staff training updates
  • Client communication where applicable

9.3 Implementation and Communication

Policy changes are implemented through:

  • Staff notification and training
  • System and procedure updates
  • Client notification when required
  • Regulatory filing of significant changes
  • Website and documentation updates

Compliance Contact Information

AML/KYC Compliance Officer

Reporting Channels

We Fund Elite Crypto Traders

We Copy Your Trades
You Keep 80% Profits

Pass our challenge, get funded up to $200,000, and scale to $5 Million. No hidden fees, no tricks – just pure profit sharing.

$200K
Max Funding
80%
Profit Split
14 Days
To Payout
No Time Limits
Free Retries Available
TradeLocker Platform