Contractual Terms and Conditions for using the L.cash System and services
ANTI-MONEY LAUNDERING/COMBATING THE FINANCING OF TERRORISM (AML/CFT)
We are UAB Livil Pay ('Company', 'we', 'us', or 'our'), a company registered in Lithuania at VAT number is 305963747. We operate the website http://L.cash (the 'Site'), the mobile application L.cash (the 'App'), as well as any other related products and services that refer or link to these AML&CTF. These Legal Terms constitute a legally binding agreement made between you, whether personally or on behalf of an entity ('you'), and UAB Livil Pay, concerning your access to and use of the Services. You agree that by accessing the Services, you have read, understood, and agreed to be bound by all of these Legal Terms. IF YOU DO NOT AGREE WITH ALL OF THESE LEGAL TERMS, THEN YOU ARE EXPRESSLY PROHIBITED FROM USING THE SERVICES AND YOU MUST DISCONTINUE USE IMMEDIATELY.TABLE OF CONTENT
1. TERMS AND DEFINITIONS
'Money laundering' or 'ML' means the doing of any act which constitutes an offence of money laundering under the Criminal Code of the Republic of Lithuania and is defined in the Law on the Prevention of Money Laundering and Terrorist Financing of the Republic of Lithuania. The criminal acts cover all procedures that seek to change the identity of illegally obtained funds, arising from drug dealing, terrorist activities or any other crime in order to give impression that such money originated from legitimate or legal sources. Money laundering is the participation in any transaction that seeks to conceal or disguise the nature or origin of funds derived from illegal activities such as, for example, fraud, corruption, organized crime, or terrorism etc. Predicate offences for money laundering are defined by the Criminal Code of the Republic of Lithuania. 'Terrorist financing' or 'TF' means the provision of funds, directly or indirectly, with the intention that they should be used or in knowledge that they are to be used in order to carry out any of the offences within the meaning of Articles 1-4 of Council Framework Decision 2002/475/JHA of 13 June 2002 on combating terrorism (as amended by Framework Decision 2008/919/JHA of 28 November 2008) and falling under Articles 250, 2501 - 2506 of the Criminal Code of the Republic of Lithuania. 'Company' means UAB 'LIVIL PAY'. The term 'Company' when used in these Procedures also refers to the management bodies of the Company and the members of such bodies as well as the employees of the Company. 'Employee of the Company' or 'Employee' means any natural person who is employed by the Company on the basis of employment agreement or other agreement. The term 'Employee' when used in these Procedures also refers to the management bodies of the Company and the members of such bodies, unless the context requires otherwise. 'Client' means a person that uses services provided by the Company. 'Beneficial owner' means a natural person who ultimately owns or controls the Client or a natural person on whose behalf a Transaction is being conducted or the Monetary operations is being executed. The Beneficial owner is:
1. |
Log of Submitted SARs |
To be kept for 8 years after terminating business relationship |
|
||
2. |
Log of virtual currency exchange and transactions equal or greater than EUR 15 000 or currency/virtual currency equivalent |
|
3. |
Log of all customer transactions |
|
4. |
Log of business relationships terminated due to ML/TF reasons |
|
5. |
Copies of ID documents, identification information and KYC information |
|
6. |
Digital currency wallet address together with owner's identity information |
|
7. |
Correspondence with customer |
To be kept for 5 years after terminating business relationship |
8. |
Supporting documents obtained from customer |
To be kept for 8 years after completing transaction |
9. |
Internal investigation records of suspicious transactions |
To be kept for 5 years |
10. |
Other records |
To be kept for 8 years |
2. ROLES AND RESPONSIBILITIES
The Board has a critical oversight role - as the senior-most management of the company, they should approve and oversee policies for risk, risk management and compliance. The Board also should have a clear understanding of the ML risks, including timely, complete, and accurate information related to the risk assessment to make informed decisions. Along with the General manager, the Board should appoint a qualified AML Officer with overall responsibility for the AML function and provide this senior-level officer with sufficient authority that when issues are raised they get the appropriate attention from the Board, the General manager and the business lines. The Board is responsible for the overall AML/CTF compliance policy of the Company and ensuring adequate resources are provided for the proper training of staff and the implementing of risk systems. The Board will receive and consider quarterly compliance reports presented by the AML Officer.
The General Manager will receive and consider the monthly compliance reports sent by the AML Officer and authorize changes based on the recommendations if required. General Manager will also receive reports on particularly significant changes that may present risk to the organization. Assistance may be given to the AML Officer in the preparation of the AML program.
The Compliance Officer (AML Officer) is responsible for managing compliance risks, developing company's policies and procedures, and monitoring compliance issues. The AML Officer is responsible for reporting significant changes that may present high ML/TF risks to the Company. The AML Officer prepares monthly and quarterly reports for consideration to the General Manager and the Board and conducts risk assessments of compliance systems, develops regular random analysis. The AML Officer establishes and implements the risk scoring matrix following regulatory guidance and for review and approval by the General Manager.
The MLR Officer (MLRO) is responsible for Transaction monitoring, receiving internal disclosures and making reports to the Financial Crime Investigation Service (FCIS). First point of contact for all compliance issues from staff. MLRO undertakes regular random analysis of transactions including assessment of documentary evidence provided by Clients and prepares any necessary amendments to the Policy in line with risk assessment. MLRO ensures everyone is periodically informed of any changes in anti-money laundering and anti-terrorist financing legislation, policies and procedures, as well as current developments and changes in money laundering or terrorist activity financing schemes particular to their jobs, constructing AML/CTF-related content for staff training programs. Independently from front office staff, MLRO reviews Client identification information to ensure that all the necessary information has been obtained.
Other staff members are responsible familiarize with this Policy, other internal procedures related to their job role and understanding responsibilities. Ensure AML/CTF procedures are adhered to. Ensure that all suspicious activity is reported to the AML Officer.
3. PROCEDURES TO FOLLOW
While complying with the legal procedures and implementing the ML/TF prevention measures, Employees depending on their position and functions within the Company must comply with the following procedures described in details further in these Procedures:
4. KYC PROCEDURES (CLIENT DUE DILIGENCE)
4.1 Client Due Diligence ('due diligence' or 'CDD') process must comply with procedures as detailed herein. These include the identification of the Client, ML/TF risk assessment, assessment of the financial position of the Client, validity of identity and the source of funds.
4.2 The following procedures which constitute the ML/TF prevention measures shall be carried out in order to perform customer due diligence at inception of a Business relationship with a Client:
4.3 The Client can be turned away before a Business relationship is formed, during the due diligence process or the stages following acceptance of a Business relationship.
5. IDENTIFICATION OF THE CLIENTS, THE BENEFICIAL OWNERS AND THE REPRESENTATIVES OF THE CLIENTS (WHERE APPLICABLE)
5.1 The Company requires a good working knowledge of the Client's activities in order to provide an effective service,including evidence of their identity. The Company needs to identify the Clients, their Beneficial owners (where applicable) and the representatives (where applicable) in the following circumstances:
6. IDENTIFICATION METHODS
6.1 Clients may be identified by face-to-face contact, or using non-face-to-face identification methods. This also applies to those cases where the Client, either natural or legal person, is represented by another person.
6.2 When identifying Clients by face-to-face contact, the Client must provide an original personal identification document - for natural persons; or the registration and/or other corporate documents - for legal persons. More detailed requirements on face-to-face identification are provided in Annex Two.
6.3 The non-face-to-face identification can be executed:
The more detailed information and technical requirements for non-face-to-face identification methods are provided in Annex Three.
7. RISK ASSESSMENT
7.1 An important aspect of the due diligence process is the assessment of the risks involved and the acceptability of a prospective Client. Before agreeing to provide a service to a prospective Client, an assessment of the risks involved should be completed. This involves assessing the acceptability as a Client and the risk associated with the particular services requested by the Client. This on-going evaluation is necessary to consider relevant issues before deciding as to whether the required services should be provided.
7.2 When entering into the Business relationship with the Client, the ML/TF risk is assessed on the basis of the documentation and information obtained from a prospective Client. Special attention must be given to the behavior of and the verbal communication with a prospective Client as well as the criteria of the High Risk Clients and Low Risk Clients as listed in Sections 9 and 10 below. When assessing the ML/TF risk the aim is to establish and assess the following circumstances:
commercial relationships, i.e. assessing if the behavior of a prospective Client reveals that the aims and duration of the relationship expected by a prospective Client may considerably differ from what is inherent to the profile of the typical Client of the Company; if yes, the additional clarification and/or documentation must be requested from the Client seeking to establish if there is a high ML/TF risk; in addition it needs to be established if the Client acts as a principal or is represented by the third person (agent);
product, i.e. assessing if the virtual currency exchange and wallet services in which a prospective Client is interested correspond the nature of the business and the Transaction profile of such prospective Client; if not, the additional clarification and/or documentation must be requested from the Client seeking to establish if there is a high ML/TF risk; attention should be drawn where the Client or the potential Client is to transact in new or developing technologies which may give rise to a threat of ML/TF or the use of Monetary operations or Transactions that might favor anonymity;
territory, i.e. assessing where the main place of interests of a prospective Client is situated, e.g. where the Client is living/incorporated or where the place of the main business activity of the Client is situated or where the main part of the customers of the Client comes from; it is important to establish if such main place of interests of the Client is situated in the country other than FATF country or in the Target territory; in such event the Client has to be considered as a high risk client.
7.3 The following circumstances shall indicate a high risk and accordingly trigger high risk due diligence level:
7.4 The Officer has to assess the above circumstances, indicated in Point 7.2 and 7.3 above, and decide whether to refuse accepting the Business relationship with such potential Client or, if decided to further proceed with the due diligence procedure, the enhanced due diligence has to be applied.
7.5 After the risk assessment is performed the Client is assigned to one of three categories according to its risk profile:
7.6 The profile of the Client is reviewed periodically (at least once a year) reflecting the changes in the Business relationship and behaviour of the Client as well as based on the results of the ongoing monitoring of the Client. Thus, the risk profile and, accordingly, the ML/TF prevention measures applied with respect of the Client may change from time to time.
7.7 The Company must ensure that all risk assessment documentation as well as the results of the risk assessment and all changes to the risk profile of the Client are available in the Company's records (i.e. data base) and may be made available for the future needs or if required by the relevant authorities.
8. ADDITIONAL SOURCES
8.1 In addition to the information and documentation provided by or on behalf of the Client and obtained from the Third parties (where relevant), the Company has to check the below sources if the provided information is correct or to establish the missing information regarding the Client:
8.2 EU sanctions list. Consolidated list, containing the names and identification details of all persons, groups and entities targeted by financial restrictions
8.3 The sources which the Company applies with regard to the particular Clients may differ depending on the circumstances of each particular case. The Company must ensure that all results of such searches are available in the Company's records and may be made available for the future needs or if required by the relevant authorities.
8.4 The requirement to double check the provided information by the Client may not be followed when the Client is the Financial institution.
9. ENHANCED DUE DILIGENCE PROCEDURES
The Company applies the enhanced due diligence procedures in the following instances:
9.1 High Risk Clients
All High Risk Clients must be subject to the application of enhanced due diligence measures. For instance, PEPs and the Clients from the high risk territories are considered to pose a higher risk of ML/TF and automatically require the application of enhanced due diligence and ongoing monitoring.
9.2 Politically Exposed Persons
An individual is considered as PEP for a period of 1 year after ceasing to be entrusted with the Prominent public functions.
9.3 Enhanced Due Diligence Measures
10. SIMPLIFIED DUE DILIGENCE
10.1 The simplified due diligence is allowed when the Client representing a low ML/TF risk and in the following cases:
10.2 Simplified due diligence cannot apply if there exist circumstances when the conduction of the enhanced Client identification is required.
10.3 Simplified due diligence also cannot apply, if a separate decision of the European Commission has been adopted on this issue.
10.4 Where it is established that the simplified due diligence can be used, the Company has to apply measures listed in Annex One.
10.5 This notwithstanding, the Company must ensure that supporting documentation is available in the Company's records and may be made available if required by the relevant authorities.
10.6 On-boarding procedure describes steps taken at the company to on-board customer in accordance with Law on the Prevention of Money Laundering and Terrorist Financing. This procedure applies directly to all staff working with customer on-boarding. Please refer to Onboarding procedure UAB 'LIVIL PAY'.pdf for more details.
10.7 Ongoing due diligence ('ODD') procedure has been performed during the establishment of business relationship and it deemed complete when information is reviewed and approved by compliance team. The ODD procedure is designated to guide employee through ODD process. Please refer to ODD Procedure 'LIVIL PAY'.pdf for more details.
11. SUSPICIOUS MONETARY OPERATIONS AND TRANSACTIONS
11.1 A transaction which appears unusual is not necessarily suspicious. Therefore, the unusual is, in the first instance, only a basis for further inquiry. This would then require judgement as to whether it constitutes suspicion. Below is the list of criteria of ML and TF which also serve as the examples of the ML/TF activities
11.2 Suspicious transactions are determined by the Employees of the Company when applying the ML/TF prevention measures established under this Procedure and paying attention to the Monetary operations and Transactions which according to the documentation and information obtained and the criteria listed below could be related to ML/TF. Considering the activity of the Company and the nature of financial services provided by the Company, Monetary operation or Transaction could be regarded as suspicious, if it meets at least one of the following criteria:
11.3 Suspicious monetary operations or transactions shall be also identified in accordance with the criteria for the identification of suspicious monetary transactions or transactions approved by Resolution No. V-240 of December 5th of 2014 of the Director of Financial Crime Investigation Service under the Ministry of Internal Affairs of the Republic of Lithuania "On the Approval of the List of Criteria for Money Laundering and Suspicious or Unusual Monetary Operations or Transactions Identification".
11.4 Proper attention should be given to other circumstances which are not explicitly listed above, but may raise suspicions on ML or TF. Also special attention must be given to the complex or unusually large transactions and all unusual patterns of transactions which have no apparent economic or visible lawful purpose, and Business relationship or Monetary operations with the End customers from the countries outside the EU and the third countries with the equivalent regime.
11.5 If any suspicious activity listed above or other types of suspicious activity are noticed, such activity should be immediately reported to the Officer. If necessary, an investigation of the matter may include gathering additional information internally or from Third parties or other sources as well as suspending the Monetary operation or Transaction and filing a Suspicious Transaction Report with the FIU.
11.6 Transaction monitoring ('TM') procedures enable the company to detect and assess whether customers' transaction pose suspicion when considered against their respective backgrounds and profiles. It also facilitate the holistic reviews of customer transactions over periods of time, in order to monitor for any unusual or suspicious trends, patterns or activities that may take place. TM procedure describes the steps taken by the company to recognize, investigate and report suspicious activity of customers. Please refer to Transaction Monitoring Procedure UAB 'LIVIL PAY'.pdf for more details.
12. ONGOING MONITORING
12.1 After the proper due diligence procedure is undertaken and based on the results of the latter the Client is accepted, the further monitoring of the Client, its Business relationship (where applicable), Monetary operations and Transactions must apply. Ongoing monitoring is carried out to ensure that the Clients meet the requirements stipulated in these Procedures and the Company's services are not used for any ML/TF purposes as well as to enable us to establish the possible ML/TF actions and undertake the respective preventative measures.
12.2 To monitor all the Monetary operations and Transactions undertaken by the Client and be able to assess their consistency with the knowledge, business and risk profile of the Client. During this procedure it must be assessed whether the risk profile, business or financial position of the Client changed throughout the year. Records should be amended to reflect these changes. Previous records should still be kept in file.
12.3 The Client Due Diligence measures should be also taken every time where the following circumstances reveal:
12.4 The Company must ensure that supporting documentation of the ongoing monitoring of the Clients is available in the Company's records and may be made available if required by the relevant authorities.
13. IN CASE OF SUSPECT
13.1 Internal Report. If it is identified, what is believed to be a suspicious transaction, it must immediately be reported to the AML Officer. This report should be made in writing and before executing the client's instructions to effect a transaction.
13.2 Tipping off. No member of staff or personnel may disclose to the Client concerned or to a third party, the fact that an investigation is being carried out, or that information has been transmitted to the FIU, since such disclosure Amight prejudice any investigation being carried out. Furthermore, at no stage may any member of staff or Apersonnel, tip off or warn the Client specifically about the Company's reporting obligations or that it has filed a report as this would tantamount to alerting a suspected criminal that the Company has uncovered his illegal activity. Furthermore such tipping off to the Client is likely to prejudice the effectiveness of any investigation or actions in regard to a suspicious Transaction.
13.3 In the event that the Client is inadvertently alerted to ongoing investigations, the Company is to immediately seek guidance from the FIU as to how the Company should act.
13.4 External report. When suspicious monetary operation or transaction is detected, a documented investigation must be completed, that operation or transaction must be suspended, and a report made to the FIU within three business hours. There is no minimal threshold or limit for such a report. Once suspicious monetary operation or transaction is reported to the FIU then they are required to respond within ten working days. If the FIU requests further information, then a response to that request must be provided immediately.
13.5 The Company may be also instructed by the FIU to suspend the particular Monetary operation or Transaction which the FIU alleges to be a ML/TF mean. In the latter event the Company must suspend such Monetary operation or Transaction for up to 10 (ten) business days.
13.6 The FIU must verify the reported Monetary operation or Transaction within 10 (ten) business days as of the receipt of the respective report or as of the submission of the respective instructions to the Company. If within 10 (ten) business days as of the suspension of the Suspicious Monetary operation or Transaction the Company is not required to perform temporary restriction of ownership rights according to the procedure established by the Code of Criminal Procedure of the Republic of Lithuania, the Monetary operation or Transaction has to be resumed.
13.7 The FIU may request the Company to provide all necessary information which is needed for the FIU to carry out the verification of the Suspicious Monetary operation or Transaction. In the latter event the Company must provide the requested information within 1 (one) business day after the receipt of the respective request of the FIU.
13.8 The FIU must be urgently reported (no suspension is needed) by the Company, if the Company obtains the information that the Client intends or will attempt to perform a Suspicious monetary operation or Transaction.
13.9 The Company shall notify the FIU of the Client's identity data and information on the executed virtual currency exchange transactions (virtual currency purchase or sale in decree currency) or virtual currency transactions (virtual currency asset settlements) the value of a monetary operation or transaction is equal to or greater than EUR 15 000 or currency/virtual currency equivalent, whether the transaction is carried out in the context of one or more related monetary operations. The value of the virtual currency is determined at the time of the monetary operation or transaction.
13.10 The Company has to ensure that any information requested by the FIU is provided to the FIU within 14 (fourteen) business days, unless the shorter periods are established in this Procedure or by the law.
13.11 The Company, including its Employees acting in good faith, are not responsible to the Client for the non-fulfilment of any contractual obligations and for the damage caused due to the reporting and suspension of the Suspicious Monetary operations and Transactions as well as for the provision of the information upon the request of the FIU.
13.12 All reports to the FIU must be submitted in the FIU electronic system by filling the respective electronic form of report. If due to any reasons the submission of the report to the FIU via the FIU electronic system is not available, respective report must be submitted via the e-mail or fax without any delay.
13.13 The FIU may ask for the additional information in writing or via e-mail. In the latter event the requested information must be provided in writing or via e-mail or fax.
13.14 All correspondence with the FIU is to be retained, and that written records of all telephone conversations are made. Copies of all relative documentation are to be kept in the file bearing the name 'Prevention of Money Laundering and Terrorist Funding'.
13.15 The Officer is to request guidance from the FIU on all relevant matters. 14. RECORD KEEPING
14. The Company must keep the following records:
14.2 Registers. The Company keeps the electronic Registers as defined in Section 1 above. Entries in the Registers must be executed in chronological without any delay, but not later than within 3 (three) business days as of the respective transaction is executed or the respective circumstances occurred. The Registers are managed and the respective entries in the Registers are made by the Officer, unless other person(s) is(are) appointed by the managing director of the Company.
14.3 The following data have to be filled in the Registers:
14.4 The Registers are managed in digital format. The Registers are stored on the servers of the Company and are accessible via the internal network of the Company only. The Registers are managed in the Microsoft Office Excel format. There is possibility to print out the content of the Registers on paper and this possibility remains after the data is copied in other durable medium. The IT system will have back up function which will allow reversing the Registers. Registers' data will be also stored on another server to duplicate all transactions as well as actions within the Company. The IT system allows duplicating information in less than 24 hours.
14.5 All Client information and documentation have to be kept for the period of 8 (eight) years as of the end of the Transactions or Business relationship with the Client, except the correspondence with the Client regarding the business relationship, which has to be kept for the period of 5 (five) years as of end of the Transaction or Business relationship with the Client.
14.6 The data of the Registers have to be kept for the period of 8 (eight) years as of the end of the Transaction or Business relationship with the Client.
14.7 Records may be kept both in hard copies and in soft copies, save the Registers which are kept in digital format only.
14.8 Backups of soft copies of all Monetary operations and Transactions undertaken are to be taken on a regular basis at least once a month. Certain original documents or certified copies of documents obtained are to be retained in hard copies and these should never be held exclusively in electronic format
15. IMPLEMENTATION OF ML/TF PREVENTION MEASURES
15.1 Implementation of ML/TF Prevention Measures. The Company's preventative ML/TF measures are adopted taking into account the latest supra-national and national risk assessment documents, including the documents indicated below which shall be reviewed and updated from time to time:
15.2 The managing director of the Company is responsible for the proper compliance of the Company with the requirements established by the Law on the Prevention of Money Laundering and Terrorist Financing of the Republic of Lithuania as well as other legal acts related to the prevention of ML/TF. Therefore, the managing director has to arrange the following:
15.3 When performing the above duties the managing director of the Company may appoint other persons to be responsible for the particular duties on the ML/TF prevention in the Company. In such event, the managing director of the Company remains liable under the Law on the Prevention of Money Laundering and Terrorist Financing of the Republic of Lithuania and the related legal acts for the proper fulfilment of the above duties.
15.4 The Officer is to be appointed by the managing director of the Company. The managing director of the Company may appoint an alternate the Officer during periods when the Officer is going to be unavailable for a period of time so as to ensure continuity in the Company's obligations related to the ML/TF prevention. Upon appointment or replacement (whether temporary or permanent) of the Officer the FIU is to be notified on the latter within 7 (seven) calendar days.
15.5 The Officer is responsible for the oversight of all aspects of the Company's ML/TF prevention activities and is the focal point for all such activity of the Company, including the Client Due Diligence and further ongoing monitoring of the Clients as well as the suspension and reporting to the FIU of the Suspicious Monetary operations and Transactions and all communication with the FIU.
15.6 If during the Due Diligence stage or later during the ongoing monitoring of the Client the Employee has any doubts regarding the Client or its financial activity, the Employee must apply to the Officer. The Officer has to undertake the needed internal investigation actions and decide if the circumstances reported by the Employee raise high risk of ML/TF. The Officer decides if the Client who raised the doubts can be accepted, which risk category such Client has to be assigned and if the enhanced due diligence and ongoing monitoring have to be undertaken with respect of such Client. All decisions of the Officer as well as reasons for such decisions should always be documented and retained by the Officer on file.
15.7 Employees should always file a report to the Officer upon knowledge or suspicion of ML/FT, and it is the Officer who would then consider if a Monetary operation or Transaction has to be suspended and reported to the FIU. If the Officer decides that the Monetary operation or Transaction reported to Officer by the Employee is not a Suspicious Monetary operation or Transaction and there is no need to suspend it and report to the FIU, the reasons of such a decision should always be documented and retained by the Officer on file.
15.8 Once an internal report on the Suspicious Monetary operation or Transaction is lodged with the Officer, the latter should then consider the report in the light of all other relevant information in the Company's possession. The Officer is to determine whether the transaction gives rise to knowledge or suspicion that a Client is or could be engaged in ML or TF. The Officer is not expected to investigate the transaction other than internally or to determine whether the funds are the proceeds of criminal activity
15.9 If the Officer is in doubt as to the possibility of ML/TF involvement, he may seek guidance from the FIU. If the report on the suspicious Monetary operation or Transaction is not filed with the FIU, the Officer should document the reasons for such decision
16. TRAINING OF EMPLOYEES
16.1 All staff and kept personnel, whose duties include the handling of Clients' business, are to be adequately trained with respect to the procedures and the provisions of the Prevention of Money Laundering Act, the relevant Regulations and the relevant provisions in the Criminal Code of the Republic of Lithuania.
16.2 The level of training provided to individuals is to be appropriate to their role and seniority within the Company. In any case all Employees must have the proper training on ML/TF prevention prior to the commencement of their duties at the Company which involve the ML/TF risk.
16.3 The managing director of the Company is responsible for the proper performance of the duties related to the training of the Employees. The managing director of the Company may appoint other persons who will undertake all necessary measures for the proper training of the Employees.
17. ANNEX 1
17.1 Using the simplified identification procedure, the Company collects only the below indicated information about the Client's identity.
17.2 Following information has to be collected from the personal identification document or the registration document used for the due diligence purposes:
17.3 When applying the simplified due dilingence, the Company obtaines information indicated in point 1.2 of Annex One and also ensures that the first payment of the Client is performed from the account held in a credit institution, where the credit institution is registered in the European Union Member State or in a third country which has set the requirements equivalent to those laid down in the laws of the Republic of Lithuania and is monitored by competent authorities for compliance with these requirements, except in cases indicated in Section 10.1 (7) of the Procedures.
17.4 . In cases indicated in Section 10.1 (7) of the Procedures, the Company can deviate from the measures indicated in Sections 1.1-1.3 of Annex One, however has to perform ongoing monitoring of the Client's Business relationship, including scrutiny of transactions undertaken throughout the course of that relationship to ensure that the transactions being conducted are consistent with the Company's knowledge of the Client, the business and risk profile, and the source of funds and to ensure detection of complex or unusually large transactions and unusual patterns of transactions (the Company must analyse the grounds of performance and purpose of such operations or transactions, and execute the results of such analysis in writing).
17.5. Information can be collected either through the face-to-face contact or using electronic means.
17.6. If the thresholds indicated in Section 1.2 are exceeded, the Company must apply the full identification procedure through the face-to-face contact or using non-face-to-face identification measures.
18. ANNEX 2
18.1. Face-to-face contact identification procedure
18.2. Identity of the Clients will be verified through the face-to-face contact pursuant to the below established rules. The Client must provide personal identification document (for natural persons) or the registration and/or other corporate documents (for legal persons).
18.3 This Section also applies to those cases where the Client is represented by another person. Usually such representation is documented by the power of attorney. Where the Client is represented by another person, the Employee must identify and verify both the Client and the representative. In addition, the respective representation document (usually this will be the power of attorney) has to be verified (it is expected that you will check if the person who issued the respective document had such capacity; the validity period of the representation document and the representation powers granted by such document). The representative shall provide personal document (ID or passport) to identify its personality. Should you have any doubts regarding the representation document submitted for the identification purposes, you have to apply to the Officer who will assess the representation document submitted and will decide if the submitted document is acceptable for the identification purposes.
18.4 Where the legal person is represented by the managing director of such legal person or by other person who holds the right to represent the legal person under the respective corporate documentation, such situations is considered as the physical presence of the Client and no enhanced due diligence applies. However, the identification of the representative has to be carried out.
18.5 The documents obtained for the identification of the Client have to be sufficient to properly determine and collect the below data and information about the Client and the representative (where applicable).
18.6 Following information has to be collected from the personal identification document or the registration document used for the due diligence purposes:
Such documents submitted by the Client must be certified in the Client's file or application by the signature and the stamp of the Client, if holding a stamp is mandatory to the Client under the applicable laws.
Documents may also be certified on the non-face-to-face basis using a qualified electronic signature. In addition, the Employee has to use the reliable and independent sources (e.g. Section 8 of the Procedure) for verification of the documents and information regarding the Beneficial owner submitted by the Client.
The Employee also has to ask the Client to specify the public sources where the data and documents regarding the Beneficial owner can be verified. The following data of the Beneficial owner have to be stored by the Company and available to be submitted to the FIU if required by the latter:
18.8 Identification of the PEP
The PEP is established by verifying the information and documentation provided by the Client. The Employee has to ask the Client indicate and provide relevant information to determine if the Client or the Beneficial owner is a PEP.
The Employee also has to use additional sources (Section 8 of the Procedures) to establish and/or check the information provided by the Client with regard to the PEPs. Such searches (results thereof) must be documented and stored similarly to the copies of the personal identification documents or other due diligence documents.
18.9 Identification of the Client registered in the Target territories
In addition to the above data, where the Client is a legal person or other organisation registered in the Target territory, the Client and its representative (if applicable) must provide in writing the following information:
18.10 Information and documentation used for the identification purposes
The documents submitted for the due diligence purposes must be either:
18.11 The Employee has to make and keep the copies of the identification documents and other documents submitted by the Client for the Client identification purposes when applying face-to-face identification procedure. In case the hard copies are kept, such copies must be:
18.12 Additional information obtained from the Third parties or additional sources (Section 8 of the Procedures) must be documented and stored similarly to the copies of the personal identification documents or other due diligence documents as discussed above. Where the checks are made in the data basis or similar sources, the Employee must document the results of such searches/checks, sign and certify such documents in the same manner as the copies of the personal identification documents and store similarly to the copies of the personal identification documents or other due diligence documents.
The Employee has to make and keep the copies of the identification documents and other documents submitted by the Client for the Client identification purposes when applying face-to-face identification procedure. In case the hard copies are kept, such copies must be:
19. ANNEX 3
19.1 Non-face-to-face identification measures
Identity of the Clients will be verified through pursuant to the Procedures, including non-face-to-face identification measures established in Section 6.3 of the Procedures, and the below established rules applicable to physical and legal persons.
19.2 Identification of a physical person
Requirements |
Measures |
Level 1: Simplified Due Diligence / Exemptions |
Used when simplified due diligence is applied as described in Annex One.
|
Level 2: |
The
Company uses
the following options:
|
Unlimited |
19.3 Identification of a legal person
Requirements |
Measures |
One Level |
After the Company identifies the Client's authorised representative in accordance with identification requirements applicable to physical persons
2.1 For Clients recorded in the commercial register:
2.2 For Clients not recorded in the Commercial Register or an equivalent Register:
2.3. Client uploads identification documents of beneficial owner – electronic copy of passport/ ID card. 2.4. The Company's system verifies through the third party database that the provided information of legal entity and beneficial owner is real, it matches the name and that the person has no criminal history, or is compromised. 2.5. The information is manually reviewed by the Company's Compliance team and only after this point the Client is allowed to use the account. |
20. ANNEX 4
The following countries, territories and zones are considered as the Target territories under the Procedures:
21. ANNEX 5
The following high-risk regions or countries are prohibited from using the service:
customer service
Preview