AML Policy
AML / KYC Policy
Coinumm Anti-Money Laundering and Know Your Customer Policy (“Policy”) is designed to prevent money laundering, terrorist financing, fraud, or any other financial crime. By accepting our Terms of Service, you accept this Policy as well.
Identification and Verification
For the purposes of this Policy we may require you to provide us with the following information: first name, last name, address, telephone number, e-mail address, date of birth, taxpayer identification number, government identification number, and information regarding your bank account (such as the name of the bank, the account type, routing number and account number).
Also, we may request from you national ID, internal or international passport, selfie with you ID-card, passport or bank card, bank statement, utility bill, tax document or other documents that we consider necessary for your identification. We may request from you video identification.
We may make the inquiries, whether directly or through third parties, that we consider necessary to verify your identity or protect you and/or us against fraud or other financial crime, and to take action we reasonably deem necessary based on the results of such inquiries. You hereby acknowledge that we shall have the right to investigate you in case we determine you to be risky or suspicious.
When we carry out these inquiries, you acknowledge and agree that your personal information may be disclosed to credit reference and fraud prevention or financial crime agencies and that these agencies may respond to our inquiries in full.
We shall have the right to verify your identity on an on-going basis, including cases when your identification information has been changed or your activity seemed to be suspicious (unusual for you). We reserve the right to request up-to-date documents from you, even though you have passed identity verification in the past.
Transactions Monitoring
We may monitor and analyse your transactions. We may perform compliance-related tasks, including capturing data, filtering, record-keeping, investigation management, and reporting. We may place you on watch and service denial lists, open cases for investigation where needed, send internal communications and fill out statutory reports, if applicable.