๐ก๏ธ ANTI-MONEY LAUNDERING (AML) POLICY
Field | Value |
|---|---|
Document ID | OTCM-POL-AML-001 |
Version | 1.0 |
Effective Date | January 30, 2026 |
Classification | CONFIDENTIAL |
Approved By | Board of Directors |
๐ TABLE OF CONTENTS
- Article I: Purpose and Regulatory Framework
- Article II: AML Program Structure
- Article III: Customer Identification Program (CIP)
- Article IV: Customer Due Diligence (CDD)
- Article V: Enhanced Due Diligence (EDD)
- Article VI: Beneficial Ownership
- Article VII: Transaction Monitoring
- Article VIII: Suspicious Activity Reporting
- Article IX: OFAC Sanctions Compliance
- Article X: Blockchain-Specific Controls
- Article XI: Recordkeeping
- Article XII: Training Program
- Article XIII: Independent Testing
- Article XIV: Administration
๐ฏ ARTICLE I: PURPOSE AND REGULATORY FRAMEWORK
Section 1.1 โ Purpose
This Anti-Money Laundering Policy (the "Policy") establishes OTCM Protocol, Inc.'s (the "Company") program to prevent money laundering, terrorist financing, and other financial crimes. The Policy is designed to:
๐ฏ Objective | Description |
|---|---|
๐ก๏ธ Prevent Crime | Detect and prevent money laundering and terrorist financing |
โ๏ธ Ensure Compliance | Comply with all applicable AML laws and regulations |
๐ Identify Risk | Identify and mitigate AML/CFT risks |
๐ข Report Activity | File required reports with regulatory authorities |
๐๏ธ Protect Integrity | Protect the integrity of the financial system |
๐ Platform Security | Prevent illicit use of the OTCM Protocol platform |
Section 1.2 โ Regulatory Framework
This Policy is adopted pursuant to and in compliance with:
โ๏ธ Regulation | Description |
|---|---|
Bank Secrecy Act (BSA) | 31 U.S.C. ยง 5311 et seq. โ Recordkeeping and reporting |
USA PATRIOT Act | Enhanced due diligence, CIP requirements |
FinCEN Regulations | 31 CFR Chapter X โ AML program requirements |
OFAC Regulations | 31 CFR Parts 500-599 โ Sanctions compliance |
SEC Rule 17a-8 | Broker-dealer SAR filing requirements |
FATF Recommendations | International AML/CFT standards |
SEC January 2026 Guidance | Tokenized securities compliance |
Travel Rule | FATF Recommendation 16 โ Virtual asset transfers |
Section 1.3 โ Scope
This Policy applies to:
๐ Scope | Coverage |
|---|---|
๐ข Company Operations | All Company business activities |
๐ Platform Transactions | All OTCM Protocol platform transactions |
๐ช Token Activities | ST22 Security Token and OTCM Utility Token transactions |
๐ค Customers | All issuers, investors, and platform users |
๐ค Partners | Transfer agents, custodians, service providers |
๐ Geographic | Global operations |
Section 1.4 โ Money Laundering Defined
Money laundering is the process of disguising the proceeds of criminal activity:
๐ Stage | Description |
|---|---|
1๏ธโฃ Placement | Introducing illicit funds into the financial system |
2๏ธโฃ Layering | Disguising the trail through complex transactions |
3๏ธโฃ Integration | Reintroducing funds as legitimate assets |
๐จ Predicate Offenses Include:
๐ฐ Category | Examples |
|---|---|
๐ Drug Trafficking | Narcotics sales and distribution |
๐ฐ Fraud | Securities fraud, wire fraud, bank fraud |
๐ฐ Tax Evasion | Federal and state tax crimes |
๐ซ Terrorism | Terrorist financing and material support |
๐ค Human Trafficking | Human smuggling and trafficking |
๐๏ธ Corruption | Bribery, public corruption |
๐ณ Theft | Embezzlement, theft, robbery |
๐ Cybercrime | Ransomware, hacking, crypto theft |
๐๏ธ ARTICLE II: AML PROGRAM STRUCTURE
Section 2.1 โ Program Components
The Company's AML Program consists of five pillars:
๐๏ธ Pillar | Description |
|---|---|
1๏ธโฃ Internal Controls | Policies, procedures, and systems |
2๏ธโฃ BSA/AML Officer | Designated compliance officer |
3๏ธโฃ Training | Ongoing employee training |
4๏ธโฃ Independent Testing | Regular program audits |
5๏ธโฃ Customer Due Diligence | Risk-based CDD program |
Section 2.2 โ BSA/AML Compliance Officer
๐ค Designation
The Board of Directors designates a BSA/AML Compliance Officer (the "AML Officer") with overall responsibility for the AML Program.
๐ Qualification | Requirement |
|---|---|
๐ Knowledge | Comprehensive BSA/AML knowledge |
๐ Authority | Sufficient authority to implement program |
๐ผ Experience | Relevant compliance experience |
๐ Access | Direct access to Board and senior management |
๐ Responsibilities
๐ Duty | Description |
|---|---|
๐ฏ Program Oversight | Oversee all aspects of AML Program |
๐ Policy Development | Develop and update AML policies |
๐ Risk Assessment | Conduct enterprise AML risk assessments |
๐ข SAR Filing | Review and file Suspicious Activity Reports |
๐๏ธ Regulatory Liaison | Interface with FinCEN, SEC, examiners |
๐ Training | Ensure adequate AML training |
๐ Reporting | Report to Board on AML matters |
๐ Blockchain Monitoring | Oversee blockchain transaction monitoring |
Section 2.3 โ Board Oversight
๐ Board Responsibility | Frequency |
|---|---|
โ Approve AML Policy | Annually and as amended |
๐ Review AML Reports | Quarterly |
๐ Review Audit Findings | Upon completion |
๐ค Approve AML Officer | Upon appointment |
๐ฐ Allocate Resources | Annually |
Section 2.4 โ Risk Assessment
The AML Officer shall conduct an enterprise-wide AML risk assessment:
๐ Risk Factor | Considerations |
|---|---|
๐ค Customer Risk | Customer types, geographic locations |
๐ Product Risk | Products and services offered |
๐ Geographic Risk | Countries and regions served |
๐ Channel Risk | Delivery channels (online, blockchain) |
๐ฐ Transaction Risk | Transaction types, volumes, patterns |
๐ Risk Rating
๐ฆ Rating | Description | Review Frequency |
|---|---|---|
๐ข Low | Standard risk customers | Annual |
๐ก Medium | Elevated risk factors | Semi-annual |
๐ด High | Significant risk factors | Quarterly |
โซ Prohibited | Unacceptable risk | No onboarding |
๐ค ARTICLE III: CUSTOMER IDENTIFICATION PROGRAM (CIP)
Section 3.1 โ CIP Requirements
Before establishing a business relationship, the Company must:
โ Requirement | Description |
|---|---|
๐ Collect Information | Obtain required identifying information |
โ Verify Identity | Verify identity through documents or non-documentary methods |
๐ Screen Lists | Screen against OFAC and other watchlists |
๐ Maintain Records | Retain CIP records |
๐ข Provide Notice | Inform customers of CIP requirements |
Section 3.2 โ Required Information โ Individuals
๐ Information | Required | Notes |
|---|---|---|
๐ค Full Legal Name | โ Yes | As it appears on government ID |
๐ Date of Birth | โ Yes | Full DOB required |
๐ Residential Address | โ Yes | No P.O. boxes |
๐ข SSN/TIN | โ Yes | For U.S. persons |
๐ Passport Number | โ If non-U.S. | Plus country of issuance |
๐ง Email Address | โ Yes | For platform access |
๐ Phone Number | โ Yes | For verification |
Section 3.3 โ Required Information โ Entities
๐ Information | Required | Notes |
|---|---|---|
๐ข Legal Name | โ Yes | Full legal entity name |
๐ท๏ธ DBA Names | โ If applicable | All trade names |
๐ Principal Address | โ Yes | Physical address required |
๐ข EIN/TIN | โ Yes | Federal tax ID |
๐๏ธ State of Formation | โ Yes | Jurisdiction |
๐ Formation Date | โ Yes | Date of incorporation |
๐ Entity Type | โ Yes | Corporation, LLC, etc. |
๐ Website | โ If applicable | Company website |
Section 3.4 โ Identity Verification โ Individuals
๐ Documentary Verification
๐ Acceptable Documents | Requirement |
|---|---|
๐ Government-Issued Photo ID | Current, unexpired |
๐ Driver's License | U.S. state-issued |
๐ Passport | U.S. or foreign |
๐ State ID Card | Government-issued |
๐ National ID | For non-U.S. persons |
๐ป Non-Documentary Verification
๐ป Method | Description |
|---|---|
๐ Credit Bureau | Identity verification services |
๐ฆ Financial References | Bank account verification |
๐ Public Records | Government databases |
๐ Third-Party Services | KYC/identity verification providers |
Section 3.5 โ Identity Verification โ Entities
๐ Required Documents | Notes |
|---|---|
๐ Formation Documents | Articles of incorporation/organization |
๐ Good Standing Certificate | Recent certificate from state |
๐ข EIN Letter | IRS EIN confirmation |
๐ Operating Agreement | For LLCs |
๐ Bylaws | For corporations |
โ Board Resolution | Authorizing account opening |
Section 3.6 โ CIP for Platform Issuers
Issuers onboarding to OTCM Protocol require enhanced CIP:
๐ Requirement | Description |
|---|---|
๐ข Entity Verification | Full entity CIP as above |
๐ค Authorized Signers | CIP on all authorized signers |
๐ฏ Beneficial Owners | 25%+ owners identified |
๐ Control Person | Individual with significant control |
๐ Business Verification | Verification of business operations |
๐ Securities Filings | Review of SEC/state filings |
Section 3.7 โ CIP Notice
The following notice must be provided to all customers:
๐ข IMPORTANT INFORMATION ABOUT PROCEDURES FOR OPENING A NEW ACCOUNT
To help the government fight the funding of terrorism and money laundering activities, federal law requires all financial institutions to obtain, verify, and record information that identifies each person who opens an account.
What this means for you: When you open an account or access our platform, we will ask for your name, address, date of birth, and other information that will allow us to identify you. We may also ask to see your driver's license or other identifying documents.
๐ ARTICLE IV: CUSTOMER DUE DILIGENCE (CDD)
Section 4.1 โ CDD Requirements
The Company must conduct CDD on all customers to:
๐ Objective | Description |
|---|---|
๐ค Understand Customer | Know who the customer is |
๐ผ Understand Business | Understand nature and purpose of relationship |
๐ Assess Risk | Develop customer risk profile |
๐ Monitor Activity | Conduct ongoing monitoring |
๐ Update Information | Maintain current customer information |
Section 4.2 โ Customer Risk Rating
Each customer is assigned a risk rating based on:
๐ Factor | Risk Indicators |
|---|---|
๐ค Customer Type | Individual, entity, institutional |
๐ Geography | Country of residence/operations |
๐ผ Occupation/Industry | High-risk industries |
๐ฐ Transaction Patterns | Expected activity vs. actual |
๐ Source of Funds | Origin of wealth/funds |
๐ Negative News | Adverse media screening |
๐ Risk Categories
๐ฆ Category | Description | Examples |
|---|---|---|
๐ข Low Risk | Standard risk profile | U.S. individuals, established businesses |
๐ก Medium Risk | Elevated risk factors | Foreign nationals, newer businesses |
๐ด High Risk | Significant risk factors | PEPs, high-risk jurisdictions, cash-intensive |
โซ Prohibited | Unacceptable risk | Sanctioned parties, shell banks |
Section 4.3 โ Source of Funds/Wealth
๐ฐ Inquiry | Required For |
|---|---|
๐ต Source of Funds | All customers โ origin of transaction funds |
๐ฐ Source of Wealth | High-risk customers โ origin of overall wealth |
๐ Acceptable Sources
โ Source | Documentation |
|---|---|
๐ผ Employment Income | Pay stubs, tax returns |
๐ข Business Income | Financial statements, tax returns |
๐ Investment Returns | Brokerage statements |
๐ Real Estate | Sale documents |
๐ Inheritance | Estate documents |
๐ฐ Retirement Funds | Account statements |
Section 4.4 โ Nature and Purpose of Relationship
๐ Understanding | Documentation |
|---|---|
๐ฏ Purpose | Why is customer using our services? |
๐ Expected Activity | Volume, frequency, transaction types |
๐ผ Business Model | How customer generates income |
๐ Platform Use | Intended use of OTCM Protocol |
Section 4.5 โ Ongoing Monitoring
๐ Monitoring Type | Frequency |
|---|---|
๐ Transaction Monitoring | Continuous |
๐ Profile Review | Per risk rating schedule |
๐ Negative News | Periodic screening |
๐๏ธ Sanctions Screening | Daily and transaction-based |
๐ Pattern Analysis | Ongoing |
Section 4.6 โ CDD Refresh
๐ฆ Risk Level | Refresh Frequency |
|---|---|
๐ข Low | Every 3 years |
๐ก Medium | Every 2 years |
๐ด High | Annually |
โ ๏ธ Trigger Event | Upon material change |
๐ด ARTICLE V: ENHANCED DUE DILIGENCE (EDD)
Section 5.1 โ When EDD Is Required
Enhanced Due Diligence is required for:
๐ด Category | Description |
|---|---|
๐ High-Risk Jurisdictions | Countries identified by FATF, FinCEN |
๐ Politically Exposed Persons | PEPs and their associates |
๐ข Complex Structures | Multi-layered ownership, shell companies |
๐ฐ High-Value Transactions | Transactions exceeding thresholds |
โ ๏ธ Negative News | Adverse media findings |
๐ High-Risk Industries | Casinos, MSBs, crypto exchanges |
๐ Unusual Patterns | Unexplained transaction patterns |
Section 5.2 โ Politically Exposed Persons (PEPs)
๐ PEP Definition
A PEP is an individual who is or has been entrusted with a prominent public function:
๐ PEP Category | Examples |
|---|---|
๐๏ธ Government Officials | Heads of state, ministers, legislators |
โ๏ธ Judicial Officials | Senior judges, prosecutors |
๐๏ธ Military Officers | Senior military officials |
๐ฆ State Enterprise Executives | Senior executives of state-owned enterprises |
๐๏ธ Political Party Officials | Senior political party officials |
๐จโ๐ฉโ๐งโ๐ฆ Family Members | Immediate family of above |
๐ค Close Associates | Known close associates of above |
๐ PEP EDD Requirements
๐ Requirement | Description |
|---|---|
๐ Senior Approval | Senior management approval to onboard |
๐ฐ Source of Wealth | Detailed source of wealth documentation |
๐ Enhanced Monitoring | Increased transaction monitoring |
๐ Periodic Review | More frequent relationship review |
๐ข Escalation | Report to AML Officer |
Section 5.3 โ High-Risk Jurisdictions
๐ FATF High-Risk Jurisdictions
Countries subject to FATF call to action or increased monitoring:
๐ฆ Category | Treatment |
|---|---|
โซ FATF Blacklist | Prohibited โ no business relationships |
๐ด FATF Grey List | EDD required, enhanced monitoring |
๐ก FinCEN Advisories | Heightened scrutiny |
๐ High-Risk Jurisdiction EDD
๐ Requirement | Description |
|---|---|
๐ Enhanced Verification | Additional identity verification |
๐ฐ Source Documentation | Detailed source of funds/wealth |
๐ Transaction Justification | Business rationale for transactions |
๐ Senior Approval | Management approval required |
๐ Ongoing Review | Quarterly relationship review |
Section 5.4 โ Complex Ownership Structures
๐ Requirement | Description |
|---|---|
๐ Ownership Chart | Complete ownership structure diagram |
๐ค Ultimate Beneficial Owner | Identify natural persons with control |
๐ผ Business Rationale | Legitimate reason for structure |
๐ Jurisdiction Review | Review all jurisdictions involved |
๐ Documentation | Full documentation of structure |
Section 5.5 โ EDD Documentation
All EDD must be documented including:
๐ Documentation | Description |
|---|---|
๐ฆ Risk Assessment | Written risk assessment |
๐ EDD Procedures | EDD steps performed |
๐ Findings | Results of EDD |
โ Approval | Management approval and rationale |
๐ Supporting Documents | All supporting documentation |
๐ฅ ARTICLE VI: BENEFICIAL OWNERSHIP
Section 6.1 โ Beneficial Ownership Requirements
For legal entity customers, the Company must identify and verify:
๐ค Category | Requirement |
|---|---|
๐ Equity Owners | Each individual owning 25%+ of the entity |
๐ Control Person | At least one individual with significant control |
Section 6.2 โ Ownership Threshold
๐ Ownership Level | Identification Required |
|---|---|
25%+ | โ Yes โ full CIP required |
10-24% | โ For high-risk entities |
< 10% | โ ๏ธ If significant control |
Section 6.3 โ Control Person
At least one Control Person must be identified โ an individual with significant responsibility to control, manage, or direct the entity:
๐ Examples | Description |
|---|---|
๐ CEO | Chief Executive Officer |
๐ฐ CFO | Chief Financial Officer |
โ๏ธ General Counsel | Chief Legal Officer |
๐ฏ Managing Member | For LLCs |
๐ General Partner | For partnerships |
Section 6.4 โ Certification
Entity customers must certify beneficial ownership on the Beneficial Ownership Certification Form:
๐ Certification Content | Required |
|---|---|
๐ข Entity Information | Legal name, address, type |
๐ค Beneficial Owners | Name, DOB, address, SSN, ownership % |
๐ Control Person | Name, DOB, address, SSN, title |
โ๏ธ Signature | Authorized representative signature |
๐ Date | Date of certification |
Section 6.5 โ Verification
๐ Verification Step | Description |
|---|---|
๐ Document Review | Formation documents, ownership records |
๐ Database Verification | Third-party verification services |
๐ Public Records | Secretary of state, SEC filings |
๐ป Screening | Sanctions and negative news screening |
Section 6.6 โ Exemptions
Certain entities are exempt from beneficial ownership requirements:
โ Exempt Entity | Reason |
|---|---|
๐ Publicly Traded | SEC reporting companies |
๐ฆ Regulated Financial Institutions | Subject to existing AML requirements |
๐๏ธ Government Entities | Federal, state, local governments |
๐ Registered Investment Companies | SEC-registered funds |
๐ฆ Bank-Regulated Entities | Banks, credit unions |
Section 6.7 โ Platform Issuer Beneficial Ownership
For issuers on OTCM Protocol:
๐ Requirement | Description |
|---|---|
๐ค All 10%+ Owners | Lower threshold than standard |
๐ All Officers | CEO, CFO, and other executive officers |
๐๏ธ All Directors | Board members |
๐ Cap Table Review | Full review of capitalization table |
๐ Ongoing Updates | Material ownership changes reported |
๐ ARTICLE VII: TRANSACTION MONITORING
Section 7.1 โ Monitoring Program
The Company maintains a transaction monitoring program to detect:
๐ Detection Target | Description |
|---|---|
๐ฐ Suspicious Activity | Potentially illicit transactions |
๐ Unusual Patterns | Deviations from expected activity |
๐จ Structuring | Transactions designed to evade reporting |
๐ Sanctions Violations | Transactions with sanctioned parties |
๐ Threshold Exceedances | Transactions exceeding defined limits |
Section 7.2 โ Monitoring Methods
๐ Method | Description |
|---|---|
๐ค Automated Systems | Rules-based transaction monitoring |
๐ Behavioral Analytics | Pattern detection and anomaly identification |
๐ค Manual Review | Human review of flagged transactions |
๐ Blockchain Analysis | On-chain transaction analysis |
๐ Periodic Reviews | Scheduled account reviews |
Section 7.3 โ Red Flags
๐ฐ Transaction Red Flags
๐จ Red Flag | Description |
|---|---|
๐ต Structuring | Multiple transactions just below thresholds |
๐ Round-Tripping | Funds sent and returned without purpose |
โก Rapid Movement | Quick in-and-out of funds |
๐ Unusual Volume | Activity inconsistent with profile |
๐ High-Risk Jurisdictions | Transactions with sanctioned/high-risk countries |
๐ค Third-Party Payments | Unexplained third-party involvement |
๐ค Customer Red Flags
๐จ Red Flag | Description |
|---|---|
๐ Reluctant Documentation | Hesitancy to provide required documents |
๐ Frequent Changes | Frequent changes to account information |
โ Inconsistent Information | Information doesn't match public records |
๐ฐ Unusual Behavior | Nervousness, urgency, secrecy |
๐ผ No Business Purpose | Cannot explain business rationale |
๐ซ Avoiding Thresholds | Requests to avoid reporting requirements |
๐ Blockchain Red Flags
๐จ Red Flag | Description |
|---|---|
๐ Mixer/Tumbler Use | Transactions through mixing services |
๐ Darknet Connections | Wallets associated with darknet markets |
๐ณ Multiple Wallets | Rapid transfers across many wallets |
๐ Chain Hopping | Cross-chain transfers to obscure origin |
๐ค Automated Layering | Bot-driven transaction layering |
๐จ Sanctioned Wallets | Interaction with OFAC-listed addresses |
Section 7.4 โ Alert Management
โก Step | Timeline | Action |
|---|---|---|
1๏ธโฃ | Real-time | Alert generated by monitoring system |
2๏ธโฃ | Within 24 hours | Alert assigned to analyst |
3๏ธโฃ | Within 5 days | Initial review completed |
4๏ธโฃ | Within 15 days | Investigation completed |
5๏ธโฃ | Within 30 days | SAR filed if warranted |
Section 7.5 โ Investigation Procedures
๐ Step | Action |
|---|---|
๐ Gather Information | Collect transaction records, customer data |
๐ Blockchain Analysis | Analyze on-chain activity |
๐ Pattern Analysis | Review for patterns and anomalies |
๐ค Customer Inquiry | Contact customer if appropriate |
๐ Document Findings | Complete investigation memo |
๐ฆ Disposition | Close, escalate, or file SAR |
๐ข ARTICLE VIII: SUSPICIOUS ACTIVITY REPORTING
Section 8.1 โ SAR Filing Obligation
The Company must file a Suspicious Activity Report (SAR) when:
๐ Threshold | Requirement |
|---|---|
๐ฐ $5,000+ | Suspicious activity involving $5,000 or more |
๐ค Known Subject | Where a suspect can be identified |
โ Unknown Subject | $25,000+ with no identifiable suspect |
๐ Ongoing Relationship | Any amount if relationship exists |
Section 8.2 โ What Is Suspicious
Activity is suspicious if it:
๐จ Indicator | Description |
|---|---|
๐ฐ Involves Criminal Proceeds | Known or suspected proceeds of crime |
๐ซ Evades Reporting | Designed to evade BSA reporting |
โ Lacks Business Purpose | No apparent lawful purpose |
๐ Unusual Pattern | Unusual given customer profile |
๐ญ Disguises Ownership | Designed to disguise ownership/control |
Section 8.3 โ SAR Filing Timeline
โฑ๏ธ Timeline | Requirement |
|---|---|
๐ 30 Days | From detection of suspicious activity |
๐ 60 Days | If no suspect identified (to identify suspect) |
๐จ Immediate | If imminent threat to life or property |
Section 8.4 โ SAR Content
๐ Section | Required Information |
|---|---|
๐ค Subject Information | Name, address, ID numbers, account info |
๐ข Filing Institution | Company information |
๐ Suspicious Activity | Type, date, amount, instruments |
๐ Narrative | Detailed description of suspicious activity |
๐ Supporting Documentation | Referenced but not attached |
Section 8.5 โ SAR Confidentiality
๐ SARs are STRICTLY CONFIDENTIAL
๐ซ Prohibition | Description |
|---|---|
๐ซ No Disclosure | Cannot disclose SAR filing to subject |
๐ซ No Tipping | Cannot notify subject of investigation |
๐ซ Limited Sharing | Share only with authorized parties |
โ FinCEN Requests | Must respond to FinCEN requests |
โ Law Enforcement | Cooperate with law enforcement requests |
Section 8.6 โ Continuing Activity
For ongoing suspicious activity:
๐ Requirement | Description |
|---|---|
๐ 90-Day Review | Review and file continuation SAR |
๐ New Information | File new SAR if material new information |
๐ Document Review | Document decision to continue or close |
Section 8.7 โ SAR Safe Harbor
๐ก๏ธ 31 U.S.C. ยง 5318(g)(3) provides protection from liability for good faith SAR filings.
๐๏ธ ARTICLE IX: OFAC SANCTIONS COMPLIANCE
Section 9.1 โ OFAC Program Overview
The Company maintains a sanctions compliance program to ensure:
๐ก๏ธ Objective | Description |
|---|---|
๐ซ Prohibited Transactions | No transactions with sanctioned parties |
๐ Screening | All customers and transactions screened |
โ๏ธ Blocking | Blocked property properly handled |
๐ข Reporting | Required reports filed |
Section 9.2 โ OFAC Lists Screened
๐ List | Description |
|---|---|
๐ SDN List | Specially Designated Nationals and Blocked Persons |
๐ข SSI List | Sectoral Sanctions Identifications |
๐ซ FSE List | Foreign Sanctions Evaders |
๐ CAPTA List | Correspondent Account or Payable-Through Account |
๐ Country Programs | Cuba, Iran, North Korea, Syria, Russia, etc. |
Section 9.3 โ Screening Requirements
๐ Screening Point | Requirement |
|---|---|
๐ค Customer Onboarding | Screen before account opening |
๐ Transaction Processing | Screen all transactions |
๐ Periodic Rescreening | Daily against updated lists |
๐ Name Changes | Screen when customer information changes |
๐ Counterparties | Screen all transaction counterparties |
Section 9.4 โ Blockchain Sanctions Screening
๐ Screening Type | Description |
|---|---|
๐ณ Wallet Screening | Screen wallet addresses against OFAC list |
๐ Transaction Screening | Screen blockchain transactions |
๐ Indirect Exposure | Identify wallets with sanctioned connections |
๐ Blockchain Analytics | Use specialized blockchain compliance tools |
๐จ OFAC-Listed Wallet Addresses
OFAC has designated specific blockchain addresses. The Company:
๐ Requirement | Action |
|---|---|
๐ซ Block Transactions | No transactions with listed addresses |
โ๏ธ Freeze Assets | Block property of listed addresses |
๐ข Report | File blocking report within 10 days |
๐ Monitor | Monitor for indirect exposure |
Section 9.5 โ Potential Match Handling
โก Step | Action |
|---|---|
1๏ธโฃ | Transaction/account placed on hold |
2๏ธโฃ | Compliance review within 24 hours |
3๏ธโฃ | Determine if true match or false positive |
4๏ธโฃ | If true match: block and report |
5๏ธโฃ | If false positive: document and release |
Section 9.6 โ Blocking and Rejecting
๐ Action | When Required |
|---|---|
โ๏ธ Block | SDN or blocked person โ freeze assets |
๐ซ Reject | Prohibited transaction โ refuse to process |
๐ข Report | File blocking report with OFAC |
Section 9.7 โ OFAC Reporting
๐ Report | Timeline |
|---|---|
โ๏ธ Blocking Report | Within 10 business days of blocking |
๐ Annual Report | By September 30 for blocked property |
๐ Voluntary Disclosure | Promptly upon discovery of violation |
๐ ARTICLE X: BLOCKCHAIN-SPECIFIC CONTROLS
Section 10.1 โ Blockchain Transaction Monitoring
๐ Control | Description |
|---|---|
๐ On-Chain Monitoring | Real-time monitoring of blockchain transactions |
๐ Wallet Analysis | Risk scoring of wallet addresses |
๐ Transaction Tracing | Source and destination tracking |
๐จ Alert Generation | Automated alerts for suspicious patterns |
Section 10.2 โ Blockchain Analytics Tools
The Company utilizes blockchain analytics to:
๐ Capability | Description |
|---|---|
๐ณ Wallet Attribution | Identify wallet owners where possible |
๐ Cluster Analysis | Identify related wallets |
๐ Risk Scoring | Assign risk scores to addresses |
๐ Illicit Activity Detection | Identify connections to illicit activity |
๐ Mixer Detection | Identify mixing/tumbling services |
๐๏ธ Sanctions Screening | Screen against OFAC-listed addresses |
Section 10.3 โ Travel Rule Compliance
For virtual asset transfers exceeding applicable thresholds:
๐ Information | Required |
|---|---|
๐ค Originator Name | Full legal name |
๐ณ Originator Wallet | Wallet address |
๐ฆ Originator Institution | If applicable |
๐ค Beneficiary Name | Full legal name |
๐ณ Beneficiary Wallet | Wallet address |
๐ฆ Beneficiary Institution | If applicable |
Section 10.4 โ Unhosted Wallet Controls
For transactions with unhosted (self-custodied) wallets:
๐ Threshold | Requirement |
|---|---|
๐ฐ > $3,000 | Collect and verify counterparty information |
๐ฐ > $10,000 | Enhanced due diligence |
๐ด High Risk | May require additional documentation |
Section 10.5 โ Token-Specific Controls
๐ช OTCM Utility Token Controls
๐ Control | Description |
|---|---|
๐ Transaction Limits | Daily/monthly transaction limits |
๐ Pattern Monitoring | Monitor for wash trading, manipulation |
๐ณ Wallet Limits | Limits on holdings per wallet |
๐ Transfer Monitoring | Monitor large transfers |
๐ ST22 Security Token Controls
๐ Control | Description |
|---|---|
๐ Transfer Hooks | Compliance checks on every transfer |
โ Whitelist Verification | Only verified wallets can hold tokens |
๐ Volume Monitoring | Monitor unusual trading volumes |
๐ Lock Enforcement | Vesting and lock-up enforcement |
๐จ Circuit Breakers | Automatic trading halts for anomalies |
Section 10.6 โ DeFi and DEX Monitoring
๐ Monitoring Area | Description |
|---|---|
๐ง Liquidity Pools | Monitor pool activity for manipulation |
๐ Bonding Curves | Monitor for artificial price manipulation |
๐ Swap Activity | Track swaps and conversions |
๐ Bridge Transactions | Monitor cross-chain activity |
๐ ARTICLE XI: RECORDKEEPING
Section 11.1 โ General Requirements
All AML records must be:
๐ Requirement | Description |
|---|---|
โ Accurate | Complete and accurate |
๐ Secure | Protected from unauthorized access |
๐ Retrievable | Retrievable within reasonable time |
๐ Organized | Systematically organized |
Section 11.2 โ Retention Periods
๐ Record Type | Retention Period |
|---|---|
๐ค CIP Records | 5 years after account closure |
๐ CDD/EDD Records | 5 years after account closure |
๐ Transaction Records | 5 years from transaction date |
๐ข SAR Records | 5 years from filing date |
๐๏ธ OFAC Records | 5 years from date of record |
๐ Training Records | 5 years |
๐ Audit Reports | 5 years |
๐ Blockchain Records | 5 years (off-chain copies) |
Section 11.3 โ CIP Records
๐ Record | Requirement |
|---|---|
๐ค Identifying Information | Name, DOB, address, ID number |
๐ ID Documents | Copies of documents used for verification |
๐ป Verification Methods | Description of methods used |
๐ Verification Results | Results of verification process |
โ ๏ธ Discrepancies | Resolution of any discrepancies |
Section 11.4 โ Transaction Records
๐ Record | Requirement |
|---|---|
๐ฐ Amount | Transaction amount |
๐ Date | Date and time of transaction |
๐ค Parties | All parties to transaction |
๐ณ Account/Wallet | Account numbers, wallet addresses |
๐ Transaction ID | Transaction hash (for blockchain) |
๐ Purpose | Nature of transaction |
Section 11.5 โ SAR Records
๐ Record | Requirement |
|---|---|
๐ข SAR Copy | Copy of filed SAR |
๐ Supporting Documentation | All supporting documents |
๐ Investigation File | Complete investigation file |
๐ Narrative Backup | Detailed narrative and analysis |
๐ ARTICLE XII: TRAINING PROGRAM
Section 12.1 โ Training Requirements
๐ Training Type | Audience | Frequency |
|---|---|---|
๐ General AML | All employees | Annual |
๐ Role-Specific | AML staff | Upon hire + annual |
๐ Management | Senior management | Annual |
๐๏ธ Board | Board of Directors | Annual |
๐ Blockchain AML | Technical staff | Upon hire + annual |
๐ข SAR Training | AML analysts | Upon hire + annual |
Section 12.2 โ Training Content
๐ Topic | Coverage |
|---|---|
โ๏ธ Legal Framework | BSA, USA PATRIOT Act, OFAC |
๐ Red Flags | Recognizing suspicious activity |
๐ข Reporting | Internal escalation, SAR filing |
๐ค CIP/CDD | Customer identification and due diligence |
๐๏ธ Sanctions | OFAC compliance |
๐ Blockchain | Crypto-specific AML concerns |
๐ Company Policy | This Policy and procedures |
Section 12.3 โ Training Documentation
๐ Documentation | Required |
|---|---|
๐ Date | Date of training |
๐ค Attendees | List of participants |
๐ Content | Training materials/agenda |
โ Completion | Attestation of completion |
๐ Assessment | Test results (if applicable) |
Section 12.4 โ Ongoing Education
๐ Method | Description |
|---|---|
๐ง Alerts | Regulatory updates and alerts |
๐ฐ Newsletters | AML compliance newsletters |
๐ Webinars | Industry webinars and conferences |
๐ Case Studies | Review of enforcement actions |
๐ ARTICLE XIII: INDEPENDENT TESTING
Section 13.1 โ Testing Requirements
๐ Requirement | Description |
|---|---|
๐ Frequency | At least annually |
๐ค Independence | Conducted by independent party |
๐ Scope | All aspects of AML program |
๐ Documentation | Written report of findings |
Section 13.2 โ Testing Scope
๐ Area | Testing Activities |
|---|---|
๐ Policies | Review of policies and procedures |
๐ CIP/CDD | Sample testing of customer files |
๐ Transaction Monitoring | Effectiveness of monitoring |
๐ข SAR Process | Review of SAR filing process |
๐๏ธ OFAC | Sanctions screening effectiveness |
๐ Training | Training program adequacy |
๐ Blockchain Controls | Blockchain-specific controls |
Section 13.3 โ Qualified Auditors
Independent testing must be conducted by:
โ Qualified Auditor | Description |
|---|---|
๐ข External Firm | Third-party audit firm with AML expertise |
๐ค Internal Audit | Internal audit (if independent) |
๐ Qualifications | CAMS, CFE, or equivalent certification |
๐ Experience | Demonstrated AML audit experience |
Section 13.4 โ Findings and Remediation
โก Step | Action |
|---|---|
1๏ธโฃ | Findings reported to AML Officer |
2๏ธโฃ | Findings reported to Board/Audit Committee |
3๏ธโฃ | Remediation plan developed |
4๏ธโฃ | Remediation implemented |
5๏ธโฃ | Follow-up testing of remediation |
๐๏ธ ARTICLE XIV: ADMINISTRATION
Section 14.1 โ Policy Owner
The BSA/AML Compliance Officer is the owner of this Policy and is responsible for:
๐ Duty | Description |
|---|---|
๐ Maintenance | Keeping Policy current |
๐ Interpretation | Providing authoritative interpretation |
๐ Reporting | Reporting to Board on AML matters |
๐ Training | Ensuring adequate training |
๐ง Updates | Recommending Policy updates |
Section 14.2 โ Annual Review
This Policy shall be reviewed annually and updated to reflect:
๐ Review Area | Consideration |
|---|---|
โ๏ธ Regulatory Changes | New laws, regulations, guidance |
๐ Best Practices | Industry developments |
๐ Audit Findings | Internal and external audit results |
๐ Risk Assessment | Updated risk assessment |
๐ Technology Changes | New blockchain/platform features |
Section 14.3 โ Amendments
๐ Amendment Type | Approval Required |
|---|---|
๐ Administrative | AML Officer |
๐ Substantive | Board of Directors |
๐จ Emergency | CEO (with Board ratification) |
Section 14.4 โ Regulatory Examinations
๐ Examination Support | Responsibility |
|---|---|
๐๏ธ Primary Contact | AML Officer |
๐ Document Production | Coordinated by AML Officer |
๐ค Interview Preparation | AML Officer and Legal |
๐ Findings Response | AML Officer with Board oversight |
Section 14.5 โ Questions
๐ง Contact: aml@otcmprotocol.com or compliance@otcmprotocol.com
Questions regarding this Policy should be directed to the AML Officer.
โ๏ธ ACKNOWLEDGMENT AND CERTIFICATION
I acknowledge that I have received and read the OTCM Protocol, Inc. Anti-Money Laundering Policy. I understand its contents and my responsibilities under this Policy.
I understand that:
- โ I must comply with all AML/BSA requirements
- โ I must report suspicious activity
- โ I must complete required AML training
- โ I must maintain confidentiality of SAR information
- โ Failure to comply may result in disciplinary action and personal liability
I commit to:
- โ Following all CIP/CDD procedures
- โ Reporting suspicious activity promptly
- โ Completing required training
- โ Cooperating with AML investigations
- โ Maintaining required records
Field | Value |
|---|---|
Signature | _________________________________ |
Date | _________________________________ |
Printed Name | _________________________________ |
Title/Position | _________________________________ |
Department | _________________________________ |
๐ APPENDIX A: RED FLAGS QUICK REFERENCE
๐ฐ Transaction Red Flags
๐จ Red Flag | Action |
|---|---|
Transactions just below reporting thresholds | Escalate to AML |
Rapid movement of funds in and out | Escalate to AML |
Transactions inconsistent with customer profile | Investigate |
High-risk jurisdiction involvement | EDD required |
Third-party payments without explanation | Investigate |
Round-trip transactions | Escalate to AML |
๐ค Customer Red Flags
๐จ Red Flag | Action |
|---|---|
Reluctance to provide documentation | Cannot onboard |
Inconsistent or false information | Cannot onboard |
Unusual secrecy about business | Escalate to AML |
Requests to avoid reporting | Report to AML |
Multiple accounts with no business purpose | Investigate |
Frequent changes to account information | Investigate |
๐ Blockchain Red Flags
๐จ Red Flag | Action |
|---|---|
Transactions through mixers/tumblers | Escalate to AML |
Connections to darknet markets | Block and report |
Interactions with OFAC-listed wallets | Block and report |
Rapid transfers across many wallets | Investigate |
Cross-chain transfers to obscure source | Investigate |
Unusual smart contract interactions | Investigate |
๐ APPENDIX B: OFAC SCREENING QUICK REFERENCE
๐๏ธ When to Screen
๐ Trigger | Screening Required |
|---|---|
New customer onboarding | โ Yes |
Every transaction | โ Yes |
Daily list updates | โ Yes |
Customer information changes | โ Yes |
Counterparty transactions | โ Yes |
Wallet address interactions | โ Yes |
๐จ Potential Match Response
โก Step | Timeline | Action |
|---|---|---|
1๏ธโฃ | Immediate | Stop transaction/hold account |
2๏ธโฃ | < 24 hours | Compliance review |
3๏ธโฃ | < 48 hours | Determination (true/false match) |
4๏ธโฃ | If true match | Block and file report |
5๏ธโฃ | If false positive | Document and release |
OTCM Protocol, Inc. A Wyoming Digital Asset Corporation
๐ SEC Category 1 Issuer-Sponsored Tokenized Securities Infrastructure
Document ID: OTCM-POL-AML-001 | Version 1.0 | Effective: January 30, 2026