Skip to main content

๐Ÿ›ก๏ธ ANTI-MONEY LAUNDERING (AML) POLICY



Field

Value

Document ID

OTCM-POL-AML-001

Version

1.0

Effective Date

January 30, 2026

Classification

CONFIDENTIAL

Approved By

Board of Directors


๐Ÿ“‹ TABLE OF CONTENTS

  1. Article I: Purpose and Regulatory Framework
  2. Article II: AML Program Structure
  3. Article III: Customer Identification Program (CIP)
  4. Article IV: Customer Due Diligence (CDD)
  5. Article V: Enhanced Due Diligence (EDD)
  6. Article VI: Beneficial Ownership
  7. Article VII: Transaction Monitoring
  8. Article VIII: Suspicious Activity Reporting
  9. Article IX: OFAC Sanctions Compliance
  10. Article X: Blockchain-Specific Controls
  11. Article XI: Recordkeeping
  12. Article XII: Training Program
  13. Article XIII: Independent Testing
  14. Article XIV: Administration

๐ŸŽฏ ARTICLE I: PURPOSE AND REGULATORY FRAMEWORK

Section 1.1 โ€” Purpose

This Anti-Money Laundering Policy (the "Policy") establishes OTCM Protocol, Inc.'s (the "Company") program to prevent money laundering, terrorist financing, and other financial crimes. The Policy is designed to:

๐ŸŽฏ Objective

Description

๐Ÿ›ก๏ธ

Prevent Crime

Detect and prevent money laundering and terrorist financing

โš–๏ธ

Ensure Compliance

Comply with all applicable AML laws and regulations

๐Ÿ”

Identify Risk

Identify and mitigate AML/CFT risks

๐Ÿ“ข

Report Activity

File required reports with regulatory authorities

๐Ÿ›๏ธ

Protect Integrity

Protect the integrity of the financial system

๐Ÿ”—

Platform Security

Prevent illicit use of the OTCM Protocol platform

Section 1.2 โ€” Regulatory Framework

This Policy is adopted pursuant to and in compliance with:

โš–๏ธ Regulation

Description

Bank Secrecy Act (BSA)

31 U.S.C. ยง 5311 et seq. โ€” Recordkeeping and reporting

USA PATRIOT Act

Enhanced due diligence, CIP requirements

FinCEN Regulations

31 CFR Chapter X โ€” AML program requirements

OFAC Regulations

31 CFR Parts 500-599 โ€” Sanctions compliance

SEC Rule 17a-8

Broker-dealer SAR filing requirements

FATF Recommendations

International AML/CFT standards

SEC January 2026 Guidance

Tokenized securities compliance

Travel Rule

FATF Recommendation 16 โ€” Virtual asset transfers

Section 1.3 โ€” Scope

This Policy applies to:

๐Ÿ“‹ Scope

Coverage

๐Ÿข

Company Operations

All Company business activities

๐Ÿ”—

Platform Transactions

All OTCM Protocol platform transactions

๐Ÿช™

Token Activities

ST22 Security Token and OTCM Utility Token transactions

๐Ÿ‘ค

Customers

All issuers, investors, and platform users

๐Ÿค

Partners

Transfer agents, custodians, service providers

๐ŸŒ

Geographic

Global operations

Section 1.4 โ€” Money Laundering Defined

Money laundering is the process of disguising the proceeds of criminal activity:

๐Ÿ”„ Stage

Description

1๏ธโƒฃ

Placement

Introducing illicit funds into the financial system

2๏ธโƒฃ

Layering

Disguising the trail through complex transactions

3๏ธโƒฃ

Integration

Reintroducing funds as legitimate assets

๐Ÿšจ Predicate Offenses Include:

๐Ÿ’ฐ Category

Examples

๐Ÿ’Š

Drug Trafficking

Narcotics sales and distribution

๐ŸŽฐ

Fraud

Securities fraud, wire fraud, bank fraud

๐Ÿ’ฐ

Tax Evasion

Federal and state tax crimes

๐Ÿ”ซ

Terrorism

Terrorist financing and material support

๐Ÿ‘ค

Human Trafficking

Human smuggling and trafficking

๐Ÿ›๏ธ

Corruption

Bribery, public corruption

๐Ÿ’ณ

Theft

Embezzlement, theft, robbery

๐ŸŒ

Cybercrime

Ransomware, hacking, crypto theft


๐Ÿ›๏ธ ARTICLE II: AML PROGRAM STRUCTURE

Section 2.1 โ€” Program Components

The Company's AML Program consists of five pillars:

๐Ÿ›๏ธ Pillar

Description

1๏ธโƒฃ

Internal Controls

Policies, procedures, and systems

2๏ธโƒฃ

BSA/AML Officer

Designated compliance officer

3๏ธโƒฃ

Training

Ongoing employee training

4๏ธโƒฃ

Independent Testing

Regular program audits

5๏ธโƒฃ

Customer Due Diligence

Risk-based CDD program

Section 2.2 โ€” BSA/AML Compliance Officer

๐Ÿ‘ค Designation

The Board of Directors designates a BSA/AML Compliance Officer (the "AML Officer") with overall responsibility for the AML Program.

๐Ÿ“‹ Qualification

Requirement

๐ŸŽ“

Knowledge

Comprehensive BSA/AML knowledge

๐Ÿ‘”

Authority

Sufficient authority to implement program

๐Ÿ’ผ

Experience

Relevant compliance experience

๐Ÿ“Š

Access

Direct access to Board and senior management

๐Ÿ“‹ Responsibilities

๐Ÿ“‹ Duty

Description

๐ŸŽฏ

Program Oversight

Oversee all aspects of AML Program

๐Ÿ“œ

Policy Development

Develop and update AML policies

๐Ÿ”

Risk Assessment

Conduct enterprise AML risk assessments

๐Ÿ“ข

SAR Filing

Review and file Suspicious Activity Reports

๐Ÿ›๏ธ

Regulatory Liaison

Interface with FinCEN, SEC, examiners

๐ŸŽ“

Training

Ensure adequate AML training

๐Ÿ“Š

Reporting

Report to Board on AML matters

๐Ÿ”—

Blockchain Monitoring

Oversee blockchain transaction monitoring

Section 2.3 โ€” Board Oversight

๐Ÿ“‹ Board Responsibility

Frequency

โœ…

Approve AML Policy

Annually and as amended

๐Ÿ“Š

Review AML Reports

Quarterly

๐Ÿ”

Review Audit Findings

Upon completion

๐Ÿ‘ค

Approve AML Officer

Upon appointment

๐Ÿ’ฐ

Allocate Resources

Annually

Section 2.4 โ€” Risk Assessment

The AML Officer shall conduct an enterprise-wide AML risk assessment:

๐Ÿ” Risk Factor

Considerations

๐Ÿ‘ค

Customer Risk

Customer types, geographic locations

๐Ÿ“Š

Product Risk

Products and services offered

๐ŸŒ

Geographic Risk

Countries and regions served

๐Ÿ”—

Channel Risk

Delivery channels (online, blockchain)

๐Ÿ’ฐ

Transaction Risk

Transaction types, volumes, patterns

๐Ÿ“Š Risk Rating

๐Ÿšฆ Rating

Description

Review Frequency

๐ŸŸข

Low

Standard risk customers

Annual

๐ŸŸก

Medium

Elevated risk factors

Semi-annual

๐Ÿ”ด

High

Significant risk factors

Quarterly

โšซ

Prohibited

Unacceptable risk

No onboarding


๐Ÿ‘ค ARTICLE III: CUSTOMER IDENTIFICATION PROGRAM (CIP)

Section 3.1 โ€” CIP Requirements

Before establishing a business relationship, the Company must:

โœ… Requirement

Description

๐Ÿ“‹

Collect Information

Obtain required identifying information

โœ…

Verify Identity

Verify identity through documents or non-documentary methods

๐Ÿ”

Screen Lists

Screen against OFAC and other watchlists

๐Ÿ“

Maintain Records

Retain CIP records

๐Ÿ“ข

Provide Notice

Inform customers of CIP requirements

Section 3.2 โ€” Required Information โ€” Individuals

๐Ÿ“‹ Information

Required

Notes

๐Ÿ‘ค

Full Legal Name

โœ… Yes

As it appears on government ID

๐Ÿ“…

Date of Birth

โœ… Yes

Full DOB required

๐Ÿ 

Residential Address

โœ… Yes

No P.O. boxes

๐Ÿ”ข

SSN/TIN

โœ… Yes

For U.S. persons

๐Ÿ›‚

Passport Number

โœ… If non-U.S.

Plus country of issuance

๐Ÿ“ง

Email Address

โœ… Yes

For platform access

๐Ÿ“ž

Phone Number

โœ… Yes

For verification

Section 3.3 โ€” Required Information โ€” Entities

๐Ÿ“‹ Information

Required

Notes

๐Ÿข

Legal Name

โœ… Yes

Full legal entity name

๐Ÿท๏ธ

DBA Names

โœ… If applicable

All trade names

๐Ÿ“

Principal Address

โœ… Yes

Physical address required

๐Ÿ”ข

EIN/TIN

โœ… Yes

Federal tax ID

๐Ÿ›๏ธ

State of Formation

โœ… Yes

Jurisdiction

๐Ÿ“…

Formation Date

โœ… Yes

Date of incorporation

๐Ÿ“‹

Entity Type

โœ… Yes

Corporation, LLC, etc.

๐ŸŒ

Website

โœ… If applicable

Company website

Section 3.4 โ€” Identity Verification โ€” Individuals

๐Ÿ“„ Documentary Verification

๐Ÿ“„ Acceptable Documents

Requirement

๐Ÿ›‚

Government-Issued Photo ID

Current, unexpired

๐Ÿš—

Driver's License

U.S. state-issued

๐Ÿ›‚

Passport

U.S. or foreign

๐Ÿ†”

State ID Card

Government-issued

๐ŸŒ

National ID

For non-U.S. persons

๐Ÿ’ป Non-Documentary Verification

๐Ÿ’ป Method

Description

๐Ÿ“Š

Credit Bureau

Identity verification services

๐Ÿฆ

Financial References

Bank account verification

๐Ÿ“‹

Public Records

Government databases

๐Ÿ”—

Third-Party Services

KYC/identity verification providers

Section 3.5 โ€” Identity Verification โ€” Entities

๐Ÿ“„ Required Documents

Notes

๐Ÿ“œ

Formation Documents

Articles of incorporation/organization

๐Ÿ“‹

Good Standing Certificate

Recent certificate from state

๐Ÿ”ข

EIN Letter

IRS EIN confirmation

๐Ÿ“Š

Operating Agreement

For LLCs

๐Ÿ“‹

Bylaws

For corporations

โœ…

Board Resolution

Authorizing account opening

Section 3.6 โ€” CIP for Platform Issuers

Issuers onboarding to OTCM Protocol require enhanced CIP:

๐Ÿ“‹ Requirement

Description

๐Ÿข

Entity Verification

Full entity CIP as above

๐Ÿ‘ค

Authorized Signers

CIP on all authorized signers

๐ŸŽฏ

Beneficial Owners

25%+ owners identified

๐Ÿ‘”

Control Person

Individual with significant control

๐Ÿ“Š

Business Verification

Verification of business operations

๐Ÿ“‹

Securities Filings

Review of SEC/state filings

Section 3.7 โ€” CIP Notice

The following notice must be provided to all customers:

๐Ÿ“ข IMPORTANT INFORMATION ABOUT PROCEDURES FOR OPENING A NEW ACCOUNT

To help the government fight the funding of terrorism and money laundering activities, federal law requires all financial institutions to obtain, verify, and record information that identifies each person who opens an account.

What this means for you: When you open an account or access our platform, we will ask for your name, address, date of birth, and other information that will allow us to identify you. We may also ask to see your driver's license or other identifying documents.


๐Ÿ” ARTICLE IV: CUSTOMER DUE DILIGENCE (CDD)

Section 4.1 โ€” CDD Requirements

The Company must conduct CDD on all customers to:

๐Ÿ” Objective

Description

๐Ÿ‘ค

Understand Customer

Know who the customer is

๐Ÿ’ผ

Understand Business

Understand nature and purpose of relationship

๐Ÿ“Š

Assess Risk

Develop customer risk profile

๐Ÿ”

Monitor Activity

Conduct ongoing monitoring

๐Ÿ“‹

Update Information

Maintain current customer information

Section 4.2 โ€” Customer Risk Rating

Each customer is assigned a risk rating based on:

๐Ÿ” Factor

Risk Indicators

๐Ÿ‘ค

Customer Type

Individual, entity, institutional

๐ŸŒ

Geography

Country of residence/operations

๐Ÿ’ผ

Occupation/Industry

High-risk industries

๐Ÿ’ฐ

Transaction Patterns

Expected activity vs. actual

๐Ÿ”—

Source of Funds

Origin of wealth/funds

๐Ÿ“Š

Negative News

Adverse media screening

๐Ÿ“Š Risk Categories

๐Ÿšฆ Category

Description

Examples

๐ŸŸข

Low Risk

Standard risk profile

U.S. individuals, established businesses

๐ŸŸก

Medium Risk

Elevated risk factors

Foreign nationals, newer businesses

๐Ÿ”ด

High Risk

Significant risk factors

PEPs, high-risk jurisdictions, cash-intensive

โšซ

Prohibited

Unacceptable risk

Sanctioned parties, shell banks

Section 4.3 โ€” Source of Funds/Wealth

๐Ÿ’ฐ Inquiry

Required For

๐Ÿ’ต

Source of Funds

All customers โ€” origin of transaction funds

๐Ÿ’ฐ

Source of Wealth

High-risk customers โ€” origin of overall wealth

๐Ÿ“‹ Acceptable Sources

โœ… Source

Documentation

๐Ÿ’ผ

Employment Income

Pay stubs, tax returns

๐Ÿข

Business Income

Financial statements, tax returns

๐Ÿ“ˆ

Investment Returns

Brokerage statements

๐Ÿ 

Real Estate

Sale documents

๐ŸŽ

Inheritance

Estate documents

๐Ÿ’ฐ

Retirement Funds

Account statements

Section 4.4 โ€” Nature and Purpose of Relationship

๐Ÿ“‹ Understanding

Documentation

๐ŸŽฏ

Purpose

Why is customer using our services?

๐Ÿ“Š

Expected Activity

Volume, frequency, transaction types

๐Ÿ’ผ

Business Model

How customer generates income

๐Ÿ”—

Platform Use

Intended use of OTCM Protocol

Section 4.5 โ€” Ongoing Monitoring

๐Ÿ” Monitoring Type

Frequency

๐Ÿ“Š

Transaction Monitoring

Continuous

๐Ÿ“‹

Profile Review

Per risk rating schedule

๐Ÿ”

Negative News

Periodic screening

๐Ÿ›๏ธ

Sanctions Screening

Daily and transaction-based

๐Ÿ“ˆ

Pattern Analysis

Ongoing

Section 4.6 โ€” CDD Refresh

๐Ÿšฆ Risk Level

Refresh Frequency

๐ŸŸข

Low

Every 3 years

๐ŸŸก

Medium

Every 2 years

๐Ÿ”ด

High

Annually

โš ๏ธ

Trigger Event

Upon material change


๐Ÿ”ด ARTICLE V: ENHANCED DUE DILIGENCE (EDD)

Section 5.1 โ€” When EDD Is Required

Enhanced Due Diligence is required for:

๐Ÿ”ด Category

Description

๐ŸŒ

High-Risk Jurisdictions

Countries identified by FATF, FinCEN

๐Ÿ‘”

Politically Exposed Persons

PEPs and their associates

๐Ÿข

Complex Structures

Multi-layered ownership, shell companies

๐Ÿ’ฐ

High-Value Transactions

Transactions exceeding thresholds

โš ๏ธ

Negative News

Adverse media findings

๐Ÿ”—

High-Risk Industries

Casinos, MSBs, crypto exchanges

๐Ÿ“Š

Unusual Patterns

Unexplained transaction patterns

Section 5.2 โ€” Politically Exposed Persons (PEPs)

๐Ÿ‘” PEP Definition

A PEP is an individual who is or has been entrusted with a prominent public function:

๐Ÿ‘” PEP Category

Examples

๐Ÿ›๏ธ

Government Officials

Heads of state, ministers, legislators

โš–๏ธ

Judicial Officials

Senior judges, prosecutors

๐ŸŽ–๏ธ

Military Officers

Senior military officials

๐Ÿฆ

State Enterprise Executives

Senior executives of state-owned enterprises

๐Ÿ›๏ธ

Political Party Officials

Senior political party officials

๐Ÿ‘จโ€๐Ÿ‘ฉโ€๐Ÿ‘งโ€๐Ÿ‘ฆ

Family Members

Immediate family of above

๐Ÿค

Close Associates

Known close associates of above

๐Ÿ“‹ PEP EDD Requirements

๐Ÿ“‹ Requirement

Description

๐Ÿ‘”

Senior Approval

Senior management approval to onboard

๐Ÿ’ฐ

Source of Wealth

Detailed source of wealth documentation

๐Ÿ“Š

Enhanced Monitoring

Increased transaction monitoring

๐Ÿ“‹

Periodic Review

More frequent relationship review

๐Ÿ“ข

Escalation

Report to AML Officer

Section 5.3 โ€” High-Risk Jurisdictions

๐ŸŒ FATF High-Risk Jurisdictions

Countries subject to FATF call to action or increased monitoring:

๐Ÿšฆ Category

Treatment

โšซ

FATF Blacklist

Prohibited โ€” no business relationships

๐Ÿ”ด

FATF Grey List

EDD required, enhanced monitoring

๐ŸŸก

FinCEN Advisories

Heightened scrutiny

๐Ÿ“‹ High-Risk Jurisdiction EDD

๐Ÿ“‹ Requirement

Description

๐Ÿ”

Enhanced Verification

Additional identity verification

๐Ÿ’ฐ

Source Documentation

Detailed source of funds/wealth

๐Ÿ“Š

Transaction Justification

Business rationale for transactions

๐Ÿ‘”

Senior Approval

Management approval required

๐Ÿ“‹

Ongoing Review

Quarterly relationship review

Section 5.4 โ€” Complex Ownership Structures

๐Ÿ“‹ Requirement

Description

๐Ÿ“Š

Ownership Chart

Complete ownership structure diagram

๐Ÿ‘ค

Ultimate Beneficial Owner

Identify natural persons with control

๐Ÿ’ผ

Business Rationale

Legitimate reason for structure

๐ŸŒ

Jurisdiction Review

Review all jurisdictions involved

๐Ÿ“‹

Documentation

Full documentation of structure

Section 5.5 โ€” EDD Documentation

All EDD must be documented including:

๐Ÿ“‹ Documentation

Description

๐Ÿšฆ

Risk Assessment

Written risk assessment

๐Ÿ“‹

EDD Procedures

EDD steps performed

๐Ÿ“Š

Findings

Results of EDD

โœ…

Approval

Management approval and rationale

๐Ÿ“

Supporting Documents

All supporting documentation


๐Ÿ‘ฅ ARTICLE VI: BENEFICIAL OWNERSHIP

Section 6.1 โ€” Beneficial Ownership Requirements

๐Ÿ‘ค Category

Requirement

๐Ÿ“Š

Equity Owners

Each individual owning 25%+ of the entity

๐Ÿ‘”

Control Person

At least one individual with significant control

Section 6.2 โ€” Ownership Threshold

๐Ÿ“Š Ownership Level

Identification Required

25%+

โœ… Yes โ€” full CIP required

10-24%

โœ… For high-risk entities

< 10%

โš ๏ธ If significant control

Section 6.3 โ€” Control Person

At least one Control Person must be identified โ€” an individual with significant responsibility to control, manage, or direct the entity:

๐Ÿ‘” Examples

Description

๐Ÿ‘”

CEO

Chief Executive Officer

๐Ÿ’ฐ

CFO

Chief Financial Officer

โš–๏ธ

General Counsel

Chief Legal Officer

๐ŸŽฏ

Managing Member

For LLCs

๐Ÿ‘”

General Partner

For partnerships

Section 6.4 โ€” Certification

Entity customers must certify beneficial ownership on the Beneficial Ownership Certification Form:

๐Ÿ“‹ Certification Content

Required

๐Ÿข

Entity Information

Legal name, address, type

๐Ÿ‘ค

Beneficial Owners

Name, DOB, address, SSN, ownership %

๐Ÿ‘”

Control Person

Name, DOB, address, SSN, title

โœ๏ธ

Signature

Authorized representative signature

๐Ÿ“…

Date

Date of certification

Section 6.5 โ€” Verification

๐Ÿ“‹ Verification Step

Description

๐Ÿ“„

Document Review

Formation documents, ownership records

๐Ÿ”

Database Verification

Third-party verification services

๐Ÿ“Š

Public Records

Secretary of state, SEC filings

๐Ÿ’ป

Screening

Sanctions and negative news screening

Section 6.6 โ€” Exemptions

Certain entities are exempt from beneficial ownership requirements:

โœ… Exempt Entity

Reason

๐Ÿ“Š

Publicly Traded

SEC reporting companies

๐Ÿฆ

Regulated Financial Institutions

Subject to existing AML requirements

๐Ÿ›๏ธ

Government Entities

Federal, state, local governments

๐Ÿ“‹

Registered Investment Companies

SEC-registered funds

๐Ÿฆ

Bank-Regulated Entities

Banks, credit unions

Section 6.7 โ€” Platform Issuer Beneficial Ownership

For issuers on OTCM Protocol:

๐Ÿ“‹ Requirement

Description

๐Ÿ‘ค

All 10%+ Owners

Lower threshold than standard

๐Ÿ‘”

All Officers

CEO, CFO, and other executive officers

๐Ÿ›๏ธ

All Directors

Board members

๐Ÿ“Š

Cap Table Review

Full review of capitalization table

๐Ÿ”„

Ongoing Updates

Material ownership changes reported


๐Ÿ“Š ARTICLE VII: TRANSACTION MONITORING

Section 7.1 โ€” Monitoring Program

The Company maintains a transaction monitoring program to detect:

๐Ÿ” Detection Target

Description

๐Ÿ’ฐ

Suspicious Activity

Potentially illicit transactions

๐Ÿ“Š

Unusual Patterns

Deviations from expected activity

๐Ÿšจ

Structuring

Transactions designed to evade reporting

๐ŸŒ

Sanctions Violations

Transactions with sanctioned parties

๐Ÿ“ˆ

Threshold Exceedances

Transactions exceeding defined limits

Section 7.2 โ€” Monitoring Methods

๐Ÿ” Method

Description

๐Ÿค–

Automated Systems

Rules-based transaction monitoring

๐Ÿ“Š

Behavioral Analytics

Pattern detection and anomaly identification

๐Ÿ‘ค

Manual Review

Human review of flagged transactions

๐Ÿ”—

Blockchain Analysis

On-chain transaction analysis

๐Ÿ“‹

Periodic Reviews

Scheduled account reviews

Section 7.3 โ€” Red Flags

๐Ÿ’ฐ Transaction Red Flags

๐Ÿšจ Red Flag

Description

๐Ÿ’ต

Structuring

Multiple transactions just below thresholds

๐Ÿ”„

Round-Tripping

Funds sent and returned without purpose

โšก

Rapid Movement

Quick in-and-out of funds

๐Ÿ“Š

Unusual Volume

Activity inconsistent with profile

๐ŸŒ

High-Risk Jurisdictions

Transactions with sanctioned/high-risk countries

๐Ÿ‘ค

Third-Party Payments

Unexplained third-party involvement

๐Ÿ‘ค Customer Red Flags

๐Ÿšจ Red Flag

Description

๐Ÿ“‹

Reluctant Documentation

Hesitancy to provide required documents

๐Ÿ”„

Frequent Changes

Frequent changes to account information

โ“

Inconsistent Information

Information doesn't match public records

๐Ÿ˜ฐ

Unusual Behavior

Nervousness, urgency, secrecy

๐Ÿ’ผ

No Business Purpose

Cannot explain business rationale

๐Ÿšซ

Avoiding Thresholds

Requests to avoid reporting requirements

๐Ÿ”— Blockchain Red Flags

๐Ÿšจ Red Flag

Description

๐Ÿ”€

Mixer/Tumbler Use

Transactions through mixing services

๐ŸŒ‘

Darknet Connections

Wallets associated with darknet markets

๐Ÿ’ณ

Multiple Wallets

Rapid transfers across many wallets

๐Ÿ”—

Chain Hopping

Cross-chain transfers to obscure origin

๐Ÿค–

Automated Layering

Bot-driven transaction layering

๐Ÿšจ

Sanctioned Wallets

Interaction with OFAC-listed addresses

Section 7.4 โ€” Alert Management

โšก Step

Timeline

Action

1๏ธโƒฃ

Real-time

Alert generated by monitoring system

2๏ธโƒฃ

Within 24 hours

Alert assigned to analyst

3๏ธโƒฃ

Within 5 days

Initial review completed

4๏ธโƒฃ

Within 15 days

Investigation completed

5๏ธโƒฃ

Within 30 days

SAR filed if warranted

Section 7.5 โ€” Investigation Procedures

๐Ÿ” Step

Action

๐Ÿ“‹

Gather Information

Collect transaction records, customer data

๐Ÿ”—

Blockchain Analysis

Analyze on-chain activity

๐Ÿ“Š

Pattern Analysis

Review for patterns and anomalies

๐Ÿ‘ค

Customer Inquiry

Contact customer if appropriate

๐Ÿ“‹

Document Findings

Complete investigation memo

๐Ÿšฆ

Disposition

Close, escalate, or file SAR


๐Ÿ“ข ARTICLE VIII: SUSPICIOUS ACTIVITY REPORTING

Section 8.1 โ€” SAR Filing Obligation

The Company must file a Suspicious Activity Report (SAR) when:

๐Ÿ“‹ Threshold

Requirement

๐Ÿ’ฐ

$5,000+

Suspicious activity involving $5,000 or more

๐Ÿ‘ค

Known Subject

Where a suspect can be identified

โ“

Unknown Subject

$25,000+ with no identifiable suspect

๐Ÿ”—

Ongoing Relationship

Any amount if relationship exists

Section 8.2 โ€” What Is Suspicious

Activity is suspicious if it:

๐Ÿšจ Indicator

Description

๐Ÿ’ฐ

Involves Criminal Proceeds

Known or suspected proceeds of crime

๐Ÿšซ

Evades Reporting

Designed to evade BSA reporting

โ“

Lacks Business Purpose

No apparent lawful purpose

๐Ÿ“Š

Unusual Pattern

Unusual given customer profile

๐ŸŽญ

Disguises Ownership

Designed to disguise ownership/control

Section 8.3 โ€” SAR Filing Timeline

โฑ๏ธ Timeline

Requirement

๐Ÿ“…

30 Days

From detection of suspicious activity

๐Ÿ“…

60 Days

If no suspect identified (to identify suspect)

๐Ÿšจ

Immediate

If imminent threat to life or property

Section 8.4 โ€” SAR Content

๐Ÿ“‹ Section

Required Information

๐Ÿ‘ค

Subject Information

Name, address, ID numbers, account info

๐Ÿข

Filing Institution

Company information

๐Ÿ“Š

Suspicious Activity

Type, date, amount, instruments

๐Ÿ“

Narrative

Detailed description of suspicious activity

๐Ÿ“Ž

Supporting Documentation

Referenced but not attached

Section 8.5 โ€” SAR Confidentiality

๐Ÿ”’ SARs are STRICTLY CONFIDENTIAL

๐Ÿšซ Prohibition

Description

๐Ÿšซ

No Disclosure

Cannot disclose SAR filing to subject

๐Ÿšซ

No Tipping

Cannot notify subject of investigation

๐Ÿšซ

Limited Sharing

Share only with authorized parties

โœ…

FinCEN Requests

Must respond to FinCEN requests

โœ…

Law Enforcement

Cooperate with law enforcement requests

Section 8.6 โ€” Continuing Activity

For ongoing suspicious activity:

๐Ÿ“‹ Requirement

Description

๐Ÿ”„

90-Day Review

Review and file continuation SAR

๐Ÿ“Š

New Information

File new SAR if material new information

๐Ÿ“‹

Document Review

Document decision to continue or close

Section 8.7 โ€” SAR Safe Harbor

๐Ÿ›ก๏ธ 31 U.S.C. ยง 5318(g)(3) provides protection from liability for good faith SAR filings.


๐Ÿ›๏ธ ARTICLE IX: OFAC SANCTIONS COMPLIANCE

Section 9.1 โ€” OFAC Program Overview

The Company maintains a sanctions compliance program to ensure:

๐Ÿ›ก๏ธ Objective

Description

๐Ÿšซ

Prohibited Transactions

No transactions with sanctioned parties

๐Ÿ”

Screening

All customers and transactions screened

โ„๏ธ

Blocking

Blocked property properly handled

๐Ÿ“ข

Reporting

Required reports filed

Section 9.2 โ€” OFAC Lists Screened

๐Ÿ“‹ List

Description

๐Ÿ“Š

SDN List

Specially Designated Nationals and Blocked Persons

๐Ÿข

SSI List

Sectoral Sanctions Identifications

๐Ÿšซ

FSE List

Foreign Sanctions Evaders

๐Ÿ”—

CAPTA List

Correspondent Account or Payable-Through Account

๐ŸŒ

Country Programs

Cuba, Iran, North Korea, Syria, Russia, etc.

Section 9.3 โ€” Screening Requirements

๐Ÿ” Screening Point

Requirement

๐Ÿ‘ค

Customer Onboarding

Screen before account opening

๐Ÿ“Š

Transaction Processing

Screen all transactions

๐Ÿ”„

Periodic Rescreening

Daily against updated lists

๐Ÿ“‹

Name Changes

Screen when customer information changes

๐Ÿ”—

Counterparties

Screen all transaction counterparties

Section 9.4 โ€” Blockchain Sanctions Screening

๐Ÿ”— Screening Type

Description

๐Ÿ’ณ

Wallet Screening

Screen wallet addresses against OFAC list

๐Ÿ”—

Transaction Screening

Screen blockchain transactions

๐Ÿ“Š

Indirect Exposure

Identify wallets with sanctioned connections

๐Ÿ”

Blockchain Analytics

Use specialized blockchain compliance tools

๐Ÿšจ OFAC-Listed Wallet Addresses

OFAC has designated specific blockchain addresses. The Company:

๐Ÿ“‹ Requirement

Action

๐Ÿšซ

Block Transactions

No transactions with listed addresses

โ„๏ธ

Freeze Assets

Block property of listed addresses

๐Ÿ“ข

Report

File blocking report within 10 days

๐Ÿ”

Monitor

Monitor for indirect exposure

Section 9.5 โ€” Potential Match Handling

โšก Step

Action

1๏ธโƒฃ

Transaction/account placed on hold

2๏ธโƒฃ

Compliance review within 24 hours

3๏ธโƒฃ

Determine if true match or false positive

4๏ธโƒฃ

If true match: block and report

5๏ธโƒฃ

If false positive: document and release

Section 9.6 โ€” Blocking and Rejecting

๐Ÿ“‹ Action

When Required

โ„๏ธ

Block

SDN or blocked person โ€” freeze assets

๐Ÿšซ

Reject

Prohibited transaction โ€” refuse to process

๐Ÿ“ข

Report

File blocking report with OFAC

Section 9.7 โ€” OFAC Reporting

๐Ÿ“‹ Report

Timeline

โ„๏ธ

Blocking Report

Within 10 business days of blocking

๐Ÿ“Š

Annual Report

By September 30 for blocked property

๐Ÿ“‹

Voluntary Disclosure

Promptly upon discovery of violation


๐Ÿ”— ARTICLE X: BLOCKCHAIN-SPECIFIC CONTROLS

Section 10.1 โ€” Blockchain Transaction Monitoring

๐Ÿ”— Control

Description

๐Ÿ“Š

On-Chain Monitoring

Real-time monitoring of blockchain transactions

๐Ÿ”

Wallet Analysis

Risk scoring of wallet addresses

๐Ÿ”—

Transaction Tracing

Source and destination tracking

๐Ÿšจ

Alert Generation

Automated alerts for suspicious patterns

Section 10.2 โ€” Blockchain Analytics Tools

The Company utilizes blockchain analytics to:

๐Ÿ” Capability

Description

๐Ÿ’ณ

Wallet Attribution

Identify wallet owners where possible

๐Ÿ”—

Cluster Analysis

Identify related wallets

๐Ÿ“Š

Risk Scoring

Assign risk scores to addresses

๐ŸŒ‘

Illicit Activity Detection

Identify connections to illicit activity

๐Ÿ”€

Mixer Detection

Identify mixing/tumbling services

๐Ÿ›๏ธ

Sanctions Screening

Screen against OFAC-listed addresses

Section 10.3 โ€” Travel Rule Compliance

For virtual asset transfers exceeding applicable thresholds:

๐Ÿ“‹ Information

Required

๐Ÿ‘ค

Originator Name

Full legal name

๐Ÿ’ณ

Originator Wallet

Wallet address

๐Ÿฆ

Originator Institution

If applicable

๐Ÿ‘ค

Beneficiary Name

Full legal name

๐Ÿ’ณ

Beneficiary Wallet

Wallet address

๐Ÿฆ

Beneficiary Institution

If applicable

Section 10.4 โ€” Unhosted Wallet Controls

For transactions with unhosted (self-custodied) wallets:

๐Ÿ“‹ Threshold

Requirement

๐Ÿ’ฐ

> $3,000

Collect and verify counterparty information

๐Ÿ’ฐ

> $10,000

Enhanced due diligence

๐Ÿ”ด

High Risk

May require additional documentation

Section 10.5 โ€” Token-Specific Controls

๐Ÿช™ OTCM Utility Token Controls

๐Ÿ“‹ Control

Description

๐Ÿ“Š

Transaction Limits

Daily/monthly transaction limits

๐Ÿ”

Pattern Monitoring

Monitor for wash trading, manipulation

๐Ÿ’ณ

Wallet Limits

Limits on holdings per wallet

๐Ÿ”—

Transfer Monitoring

Monitor large transfers

๐Ÿ”— ST22 Security Token Controls

๐Ÿ“‹ Control

Description

๐Ÿ”

Transfer Hooks

Compliance checks on every transfer

โœ…

Whitelist Verification

Only verified wallets can hold tokens

๐Ÿ“Š

Volume Monitoring

Monitor unusual trading volumes

๐Ÿ”’

Lock Enforcement

Vesting and lock-up enforcement

๐Ÿšจ

Circuit Breakers

Automatic trading halts for anomalies

Section 10.6 โ€” DeFi and DEX Monitoring

๐Ÿ”— Monitoring Area

Description

๐Ÿ’ง

Liquidity Pools

Monitor pool activity for manipulation

๐Ÿ“ˆ

Bonding Curves

Monitor for artificial price manipulation

๐Ÿ”„

Swap Activity

Track swaps and conversions

๐ŸŒ‰

Bridge Transactions

Monitor cross-chain activity


๐Ÿ“ ARTICLE XI: RECORDKEEPING

Section 11.1 โ€” General Requirements

All AML records must be:

๐Ÿ“‹ Requirement

Description

โœ…

Accurate

Complete and accurate

๐Ÿ”’

Secure

Protected from unauthorized access

๐Ÿ“‚

Retrievable

Retrievable within reasonable time

๐Ÿ“

Organized

Systematically organized

Section 11.2 โ€” Retention Periods

๐Ÿ“ Record Type

Retention Period

๐Ÿ‘ค

CIP Records

5 years after account closure

๐Ÿ”

CDD/EDD Records

5 years after account closure

๐Ÿ“Š

Transaction Records

5 years from transaction date

๐Ÿ“ข

SAR Records

5 years from filing date

๐Ÿ›๏ธ

OFAC Records

5 years from date of record

๐ŸŽ“

Training Records

5 years

๐Ÿ”

Audit Reports

5 years

๐Ÿ”—

Blockchain Records

5 years (off-chain copies)

Section 11.3 โ€” CIP Records

๐Ÿ“‹ Record

Requirement

๐Ÿ‘ค

Identifying Information

Name, DOB, address, ID number

๐Ÿ“„

ID Documents

Copies of documents used for verification

๐Ÿ’ป

Verification Methods

Description of methods used

๐Ÿ”

Verification Results

Results of verification process

โš ๏ธ

Discrepancies

Resolution of any discrepancies

Section 11.4 โ€” Transaction Records

๐Ÿ“‹ Record

Requirement

๐Ÿ’ฐ

Amount

Transaction amount

๐Ÿ“…

Date

Date and time of transaction

๐Ÿ‘ค

Parties

All parties to transaction

๐Ÿ’ณ

Account/Wallet

Account numbers, wallet addresses

๐Ÿ”—

Transaction ID

Transaction hash (for blockchain)

๐Ÿ“‹

Purpose

Nature of transaction

Section 11.5 โ€” SAR Records

๐Ÿ“‹ Record

Requirement

๐Ÿ“ข

SAR Copy

Copy of filed SAR

๐Ÿ“‹

Supporting Documentation

All supporting documents

๐Ÿ”

Investigation File

Complete investigation file

๐Ÿ“

Narrative Backup

Detailed narrative and analysis


๐ŸŽ“ ARTICLE XII: TRAINING PROGRAM

Section 12.1 โ€” Training Requirements

๐ŸŽ“ Training Type

Audience

Frequency

๐Ÿ“‹

General AML

All employees

Annual

๐Ÿ”

Role-Specific

AML staff

Upon hire + annual

๐Ÿ‘”

Management

Senior management

Annual

๐Ÿ›๏ธ

Board

Board of Directors

Annual

๐Ÿ”—

Blockchain AML

Technical staff

Upon hire + annual

๐Ÿ“ข

SAR Training

AML analysts

Upon hire + annual

Section 12.2 โ€” Training Content

๐Ÿ“‹ Topic

Coverage

โš–๏ธ

Legal Framework

BSA, USA PATRIOT Act, OFAC

๐Ÿ”

Red Flags

Recognizing suspicious activity

๐Ÿ“ข

Reporting

Internal escalation, SAR filing

๐Ÿ‘ค

CIP/CDD

Customer identification and due diligence

๐Ÿ›๏ธ

Sanctions

OFAC compliance

๐Ÿ”—

Blockchain

Crypto-specific AML concerns

๐Ÿ“œ

Company Policy

This Policy and procedures

Section 12.3 โ€” Training Documentation

๐Ÿ“‹ Documentation

Required

๐Ÿ“…

Date

Date of training

๐Ÿ‘ค

Attendees

List of participants

๐Ÿ“‹

Content

Training materials/agenda

โœ…

Completion

Attestation of completion

๐Ÿ“Š

Assessment

Test results (if applicable)

Section 12.4 โ€” Ongoing Education

๐Ÿ“‹ Method

Description

๐Ÿ“ง

Alerts

Regulatory updates and alerts

๐Ÿ“ฐ

Newsletters

AML compliance newsletters

๐ŸŽ“

Webinars

Industry webinars and conferences

๐Ÿ“‹

Case Studies

Review of enforcement actions


๐Ÿ” ARTICLE XIII: INDEPENDENT TESTING

Section 13.1 โ€” Testing Requirements

๐Ÿ“‹ Requirement

Description

๐Ÿ”„

Frequency

At least annually

๐Ÿ‘ค

Independence

Conducted by independent party

๐Ÿ“Š

Scope

All aspects of AML program

๐Ÿ“‹

Documentation

Written report of findings

Section 13.2 โ€” Testing Scope

๐Ÿ” Area

Testing Activities

๐Ÿ“‹

Policies

Review of policies and procedures

๐Ÿ”

CIP/CDD

Sample testing of customer files

๐Ÿ“Š

Transaction Monitoring

Effectiveness of monitoring

๐Ÿ“ข

SAR Process

Review of SAR filing process

๐Ÿ›๏ธ

OFAC

Sanctions screening effectiveness

๐ŸŽ“

Training

Training program adequacy

๐Ÿ”—

Blockchain Controls

Blockchain-specific controls

Section 13.3 โ€” Qualified Auditors

Independent testing must be conducted by:

โœ… Qualified Auditor

Description

๐Ÿข

External Firm

Third-party audit firm with AML expertise

๐Ÿ‘ค

Internal Audit

Internal audit (if independent)

๐ŸŽ“

Qualifications

CAMS, CFE, or equivalent certification

๐Ÿ“Š

Experience

Demonstrated AML audit experience

Section 13.4 โ€” Findings and Remediation

โšก Step

Action

1๏ธโƒฃ

Findings reported to AML Officer

2๏ธโƒฃ

Findings reported to Board/Audit Committee

3๏ธโƒฃ

Remediation plan developed

4๏ธโƒฃ

Remediation implemented

5๏ธโƒฃ

Follow-up testing of remediation


๐Ÿ›๏ธ ARTICLE XIV: ADMINISTRATION

Section 14.1 โ€” Policy Owner

The BSA/AML Compliance Officer is the owner of this Policy and is responsible for:

๐Ÿ“‹ Duty

Description

๐Ÿ“‹

Maintenance

Keeping Policy current

๐Ÿ”

Interpretation

Providing authoritative interpretation

๐Ÿ“Š

Reporting

Reporting to Board on AML matters

๐ŸŽ“

Training

Ensuring adequate training

๐Ÿ”ง

Updates

Recommending Policy updates

Section 14.2 โ€” Annual Review

This Policy shall be reviewed annually and updated to reflect:

๐Ÿ”„ Review Area

Consideration

โš–๏ธ

Regulatory Changes

New laws, regulations, guidance

๐Ÿ†

Best Practices

Industry developments

๐Ÿ”

Audit Findings

Internal and external audit results

๐Ÿ“Š

Risk Assessment

Updated risk assessment

๐Ÿ”—

Technology Changes

New blockchain/platform features

Section 14.3 โ€” Amendments

๐Ÿ“‹ Amendment Type

Approval Required

๐Ÿ“‹

Administrative

AML Officer

๐Ÿ“Š

Substantive

Board of Directors

๐Ÿšจ

Emergency

CEO (with Board ratification)

Section 14.4 โ€” Regulatory Examinations

๐Ÿ“‹ Examination Support

Responsibility

๐Ÿ›๏ธ

Primary Contact

AML Officer

๐Ÿ“‹

Document Production

Coordinated by AML Officer

๐Ÿ‘ค

Interview Preparation

AML Officer and Legal

๐Ÿ“Š

Findings Response

AML Officer with Board oversight

Section 14.5 โ€” Questions

๐Ÿ“ง Contact: aml@otcmprotocol.com or compliance@otcmprotocol.com

Questions regarding this Policy should be directed to the AML Officer.


โœ๏ธ ACKNOWLEDGMENT AND CERTIFICATION

I acknowledge that I have received and read the OTCM Protocol, Inc. Anti-Money Laundering Policy. I understand its contents and my responsibilities under this Policy.

I understand that:

  • โœ… I must comply with all AML/BSA requirements
  • โœ… I must report suspicious activity
  • โœ… I must complete required AML training
  • โœ… I must maintain confidentiality of SAR information
  • โœ… Failure to comply may result in disciplinary action and personal liability

I commit to:

  • โœ… Following all CIP/CDD procedures
  • โœ… Reporting suspicious activity promptly
  • โœ… Completing required training
  • โœ… Cooperating with AML investigations
  • โœ… Maintaining required records

Field

Value

Signature

_________________________________

Date

_________________________________

Printed Name

_________________________________

Title/Position

_________________________________

Department

_________________________________


๐Ÿ“Ž APPENDIX A: RED FLAGS QUICK REFERENCE

๐Ÿ’ฐ Transaction Red Flags

๐Ÿšจ Red Flag

Action

Transactions just below reporting thresholds

Escalate to AML

Rapid movement of funds in and out

Escalate to AML

Transactions inconsistent with customer profile

Investigate

High-risk jurisdiction involvement

EDD required

Third-party payments without explanation

Investigate

Round-trip transactions

Escalate to AML

๐Ÿ‘ค Customer Red Flags

๐Ÿšจ Red Flag

Action

Reluctance to provide documentation

Cannot onboard

Inconsistent or false information

Cannot onboard

Unusual secrecy about business

Escalate to AML

Requests to avoid reporting

Report to AML

Multiple accounts with no business purpose

Investigate

Frequent changes to account information

Investigate

๐Ÿ”— Blockchain Red Flags

๐Ÿšจ Red Flag

Action

Transactions through mixers/tumblers

Escalate to AML

Connections to darknet markets

Block and report

Interactions with OFAC-listed wallets

Block and report

Rapid transfers across many wallets

Investigate

Cross-chain transfers to obscure source

Investigate

Unusual smart contract interactions

Investigate


๐Ÿ“Ž APPENDIX B: OFAC SCREENING QUICK REFERENCE

๐Ÿ›๏ธ When to Screen

๐Ÿ“‹ Trigger

Screening Required

New customer onboarding

โœ… Yes

Every transaction

โœ… Yes

Daily list updates

โœ… Yes

Customer information changes

โœ… Yes

Counterparty transactions

โœ… Yes

Wallet address interactions

โœ… Yes

๐Ÿšจ Potential Match Response

โšก Step

Timeline

Action

1๏ธโƒฃ

Immediate

Stop transaction/hold account

2๏ธโƒฃ

< 24 hours

Compliance review

3๏ธโƒฃ

< 48 hours

Determination (true/false match)

4๏ธโƒฃ

If true match

Block and file report

5๏ธโƒฃ

If false positive

Document and release


OTCM Protocol, Inc. A Wyoming Digital Asset Corporation

๐Ÿ“œ SEC Category 1 Issuer-Sponsored Tokenized Securities Infrastructure


Document ID: OTCM-POL-AML-001 | Version 1.0 | Effective: January 30, 2026