RULES FOR THE PREVENTION OF MONEY LAUNDERING AND (OR) TERRORIST FINANCING
Effective Date: 05.2027
Issued By: AURUM NEO-BANK sp. z o.o.
Registered Headquarters: Ul. Długa 29, 00-238 Warsaw, Mazowieckie, Republic of Poland
Platform Operated: Crypto-Asset Exchange (Polex)
1. General Provisions
Purpose
AURUM NEO-BANK sp. z o.o. (the “Company”) maintains a low-risk appetite and zero-tolerance approach toward knowingly facilitating money laundering (ML), terrorist financing (TF), sanctions evasion, or other financial crime.
The Company will refuse or terminate any business relationship where ML/TF risk cannot be reduced to an acceptable level.
These Rules establish a comprehensive AML/CFT framework designed to:
- Prevent misuse of the Platform;
- Detect suspicious financial activity;
- Report relevant activity to competent authorities;
- Protect financial system integrity;
- Comply with applicable EU and Polish law.
Scope
These Rules apply to:
- All crypto-asset services provided by the Company;
- All employees, officers, directors, and contractors;
- All Customers and business relationships.
AML/CFT obligations apply at onboarding, throughout the relationship, and post-termination where required.
Legal Basis
These Rules are formulated in alignment with:
- Markets in Crypto-Assets Regulation
- Polish Act on Counteracting Money Laundering and Terrorist Financing
- EU AML Directives
- EU Transfer of Funds Regulation (TFR Recast 2023)
- FATF Recommendations
- Supervisory expectations of the Polish Financial Supervision Authority
They also reflect governance, internal control, and safeguarding obligations applicable to crypto-asset service providers under MiCA.
2. Definitions
Customer: A natural or legal person entering into a business relationship with the Company.
Beneficial Owner: The natural person who ultimately owns or controls the Customer.
Politically Exposed Person (PEP): An individual entrusted with prominent public functions, including close associates.
Crypto-Asset: A digital representation of value transferable electronically.
KYC: Know Your Customer identity verification process.
KYT: Ongoing transaction monitoring process.
STR/SAR: Suspicious Transaction Report submitted to the Polish Financial Intelligence Unit (GIIF).
3. Risk-Based Approach
The Company applies a structured risk-based AML framework evaluating:
- Customer risk;
- Geographic risk;
- Product and service risk;
- Delivery channel risk;
- Transactional behavior risk.
A formal ML/TF risk assessment is conducted at least annually and approved by senior management and the Board.
4. Customer Identification & Verification (KYC)
The Company shall:
- Verify Customer identity prior to establishing a relationship;
- Identify and verify Beneficial Owners;
- Conduct sanctions and PEP screening;
- Prohibit anonymous accounts and fictitious names.
Remote identification is permitted via compliant digital verification tools in accordance with Polish AML regulations.
5. Sanctions & Restrictive Measures Compliance
The Company conducts continuous screening against:
- EU consolidated sanctions lists;
- UN sanctions lists;
- National restrictive measures lists.
Confirmed sanctions matches result in:
- Immediate account freeze;
- Escalation to MLRO;
- Reporting to competent authorities where required.
6. Travel Rule Compliance (TFR Recast)
In accordance with FATF standards and EU Transfer of Funds Regulation:
The Company:
- Collects originator and beneficiary information for transfers;
- Verifies counterpart CASPs where applicable;
- Securely transmits required Travel Rule data;
- Rejects transfers lacking mandatory information;
- Applies enhanced scrutiny to unhosted wallet transactions.
7. Customer Risk Classification
Customers are classified into the following categories:
Low Risk
Regulated financial institutions and public authorities.
Medium Risk
Standard retail clients without elevated risk indicators.
High Risk
Includes, but is not limited to:
- Politically Exposed Persons (PEPs);
- Customers connected to high-risk or sanctioned jurisdictions;
- Complex or opaque ownership structures;
- Customers linked to high-risk crypto activity (mixers, sanctioned wallets);
- Customers with adverse media indicating financial crime risk;
- Customers exhibiting suspicious transactional behavior.
8. Strict High-Risk Client Prohibition Policy
The Company maintains a conservative risk model and does not accept, onboard, or maintain business relationships with Customers classified as High Risk.
Accordingly:
- High-risk Customers are declined at onboarding.
- Existing Customers reclassified as High Risk are subject to immediate suspension and termination review.
- Enhanced due diligence shall not be used to justify continuation of a High-Risk relationship.
- The Company does not provide services to PEPs.
- The Company does not provide services to Customers located in high-risk or sanctioned jurisdictions.
This strict exclusion policy reflects the Company’s low-risk appetite.
9. Crypto-Specific Monitoring Controls
The Company deploys blockchain analytics and monitoring tools to detect:
- Interaction with sanctioned wallets;
- Mixer/tumbler exposure;
- Cross-chain obfuscation patterns;
- High-risk DeFi protocol exposure;
- Structuring and layering activity;
- Rapid movement inconsistent with profile.
Suspicious patterns trigger immediate escalation.
10. Ongoing Monitoring (KYT)
Continuous monitoring includes:
- Transaction velocity checks;
- Behavioral anomaly detection;
- Risk-based alert thresholds;
- Manual review of high-value transactions.
11. Reporting Suspicious Activity
When reasonable suspicion is formed:
- An STR shall be submitted to the Polish Financial Intelligence Unit (GIIF) without undue delay;
- Transactions may be suspended where legally required;
- Tipping-off is strictly prohibited.
12. Relationship Termination Triggers
The Company shall suspend and terminate relationships where:
- A Customer becomes subject to sanctions;
- A Customer is identified as a PEP;
- Source of funds cannot be verified;
- Beneficial ownership cannot be confirmed;
- Repeated suspicious alerts occur;
- ML/TF risk becomes unmanageable.
Termination decisions are documented and escalated where required.
13. Governance & Escalation Framework
Escalation ladder:
Employee → Compliance → MLRO → Senior Management → Board (for material cases)
The Board:
- Approves annual AML risk assessment;
- Reviews AML metrics quarterly;
- Oversees high-risk exposure management.
14. Independent Testing & Assurance
The AML framework is subject to:
- Periodic internal testing;
- Independent AML effectiveness review;
- Remediation tracking;
- Regulatory inspection readiness procedures.
15. Data Retention
Customer identity and transaction records shall be retained for:
- Minimum five (5) years following termination of the business relationship or execution of transaction, or longer if required by law.
Records are securely stored and access-controlled.
16. Information Protection
Employees are strictly prohibited from:
- Disclosing STR filings;
- Informing Customers of investigations;
- Circumventing AML controls.
Violations may result in termination and legal liability.
17. Responsibilities
MLRO
Responsible for:
- Implementation of AML framework;
- STR submission;
- Regulator communication;
- Oversight of monitoring systems.
Employees
Required to:
- Conduct KYC/KYT procedures;
- Escalate suspicious activity;
- Complete annual AML training.
18. Performance Monitoring & Metrics
The Company tracks:
- Customer risk distribution;
- STR volumes;
- Sanctions hits;
- Terminated relationships;
- Monitoring alert statistics.
Metrics are reviewed by senior management and the Board.
19. Final Provisions
These Rules:
- Are reviewed annually;
- Updated upon regulatory changes;
- Approved by senior management;
- Supported by mandatory annual AML training.