• Price:
  • BTC/USD 63453.718815
  • BTC/EUR 58857.897594

AML/KYC Policy

Please read all legal information carefully. Whether you are a visitor of the site or a registered user, your access to and use of the Hashing24.com services are conditioned by the information contained herein. If you disagree with these terms, do not access or use the website.

AML/KYC Policy

For purposes of this Policy, “us,” “we,” or “our” refer to LIVIKA LP (6, Fern Road, Sandyford, Dublin, D18 FP8, Republic of Ireland, Registration No. LP1755) d/b/a Hashing24.

Our Anti-Money Laundering and Know Your Customer Policy (hereinafter - the “AML/KYC Policy”) are designated to prevent and mitigate possible risks of us being involved in any kind of illegal activity.

Hashing24.com Services are not offered for use to persons or legal entities located in or have their habitual residence or registered office in the United States of America or any other country where Hashing24.com does not offer Services. For as long as you maintain your registered account at Hashing24.com, you represent and warrant that you are not located in or a resident of the United States of America. You are also not allowed to use the Services if you are located in or are a resident of a Prohibited Jurisdiction. “Prohibited Jurisdiction” means any state, country, territory or other jurisdiction (1) that at any given time is subject to broad-based, geographically oriented sanctions by the United Nations, United States, The Central Bank of Ireland, the European Union sanctions list and “High risk third countries and the International context content of anti-money laundering and countering the financing of terrorism” list, OFAC, or is identified as a “call to action” jurisdiction on the FATF's list of “High-Risk and Other Monitored Jurisdictions”; (2) where your use of the Services would be illegal or otherwise violate any applicable law, or (3) that Hashing24.com determines in its sole discretion is ineligible for access to and use of the Services.

Both international and local regulations require us to implement effective internal procedures and mechanisms to prevent money laundering, terrorist financing, drug and human trafficking, proliferation of weapons of mass destruction, corruption and bribery and to take action in case of any form of suspicious activity of our customers.

AML/KYC Policy covers the following matters:

  • Compliance Officer;
  • Risk-Based Assessment;
  • Verification Procedures;
  • Monitoring Transactions and Sanctions Screening.

Compliance Officer

The Compliance Officer is the person, duly authorized by us, whose duty is to ensure the effective implementation and enforcement of the AML/KYC Policy. It is the Compliance Officer's responsibility to supervise all aspects of our anti-money laundering and counter-terrorist financing, including but not limited to:

  • Collecting customers' identification information;
  • Providing relevant KYC/CDD, including detection of PEP status, detection of final beneficiaries;
  • Establishing and updating internal policies and procedures for the completion, review, submission and retention of all reports and records required under the applicable laws and regulations;
  • Monitoring transactions and investigating any significant deviations from normal activity;
  • Implementing a records management system for appropriate storage and retrieval of documents, files, forms and logs;
  • Updating risk assessment regularly;
  • Providing law enforcement with information as required under the applicable laws and regulations.
  • Providing sanctions screening;
  • Providing trainings to the concerned personal;

The Compliance Officer is entitled to interact with law enforcement, which are involved in the prevention of money laundering, terrorist financing and other illegal activities.

Risk-Based Assessment

We, in line with the international requirements, have adopted a risk-based approach to combating money laundering and terrorist financing. By adopting a risk-based approach, we are able to ensure that measures to prevent or mitigate money laundering and terrorist financing are commensurate with the identified risks. This will allow resources to be allocated in the most efficient ways. The principle is that resources should be directed in accordance with priorities so that the greatest risks receive the highest attention.

Verification Procedures

One of the international standards for preventing illegal activity is customer due diligence (“CDD”). According to CDD, we establish our own verification procedures within the standards of Anti-Money Laundering and “Know Your Customer” frameworks.

a) Identity verification

Our identity verification procedure requires the customer to provide us with reliable, independent source documents, data or information (e.g., national ID, international passport, bank statement, proof of address). For such purposes, we reserve the right to collect customer's identification information for the AML/KYC Policy purposes.

We will take steps to confirm the authenticity of documents and information provided by the customers. All legal methods for double-checking identification information will be used and we reserve the right to investigate certain customers who have been determined to be risky or suspicious.

We reserve the right to verify a customer's identity in an on-going basis, especially when their identification information has been changed or their activity seemed to be suspicious (unusual for the particular customer). In addition, we reserve the right to request up-to-date documents from the customers, even though they have passed identity verification in the past.

Customer's identification information will be collected, stored, shared and protected strictly in accordance with our Privacy Policy and related regulations.

Once the customer's identity has been verified, we are able to remove ourselves from potential legal liability in a situation where our services are used to conduct illegal activity.

b) Card verification

The customers who use payment cards connected with our services can be asked to pass card verification. It may include:

  • Scan/photo of the card statement of the page which shows there was a payment for our services.
  • Scans/photo of the payment card (both sides). We require cardholder name and signature, first 6 and last 4 digits of the card's number have to be clearly seen. CVV code and remain part of the card's number must be hidden by a piece of paper.
  • Selfie, where the customer is holding clearly visible payment card in the hand (only first 6 and last 4 digits of the number have to be seen well) plus a piece of paper with a sign "Hashing24" and current date for the moment customer is taking the selfie.
  • Any other documents confirming that the payment has been authorized by the cardholder indeed.

c) Wealth/funds sources and origin

In compliance with our Policy, we ask our clients to explain and sometimes prove the sources of fund you use in cooperation with us and or the origin of wealth. This must be done not in formal way but rather to give us the reasonable understanding that funds you are using are not connected to illegal activity, are not sanctioned and are really yours.

d) Detection of PEP status

It is your responsibility to inform us whether you or your relatives are or were PEP but we reserve the right to obtain information from different sources to check this and if so to provide high-risk approach to you.

Monitoring Transactions and Sanctions Screening

The customers are known not only by verifying their identity (who they are) but, more important, by analyzing their transactional patterns (what they do). Therefore, we rely on data analysis as a risk-assessment and suspicion detection tool. We perform a variety of compliance-related tasks, including capturing data, filtering, recordkeeping, investigation management, and reporting. System functionalities include:

a) A daily check of customers against recognized “black lists” (e.g. OFAC, EU Sanctions lists etc), aggregating transfers by multiple data points, placing customers on watch and service denial lists, opening cases for investigation if it is essential, sending internal communications and filling out statutory reports, if applicable.

b) Case and document management.

With regard to the AML/KYC Policy, we will monitor all transactions and it reserves the right to:

  • ensure that transactions of suspicious nature are reported to the proper law enforcement through the Compliance Officer;
  • request the customer to provide any additional information and documents in case of suspicious transactions;
  • suspend or terminate customer's account when we have reasonable suspicion that such customer is engaged in illegal activity.

c) Travel rule.

In accordance with FATF Recommendations We set the rule to obtain, hold, and transmit originator and beneficiary of any virtual asset transaction information in order to identify and report suspicious transactions, monitor the availability of information, take freezing actions, and prohibit transactions with designated persons and entities. We apply all the monitoring and AML measures for destination wallets even if the beneficiary is not a Companies client.

We always obtain and hold (if we have such data) the originator of transaction information as well as information about the beneficiary of transaction and its destination wallet information.

The above list is not exhaustive and the Compliance Officer will monitor customers' transactions on a day-to-day basis in order to define whether such transactions are to be reported and treated as suspicious or are to be treated as bona fide.