About

Trader's Library

Password recovery

We will send a password recovery link to your e-mail

Email

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Timezone converter

Choose your timezone

Pacific/Midway (GMT-11:00)

Timezones and Max Daily Loss

Area

Time

CET Offset

Start Hour Max Daily Loss

End Hour Max Daily Loss

CET Time
00:25:38
1 hrs
00:00:01
23:59:59
FTMO Platform Time
00:25:38
1 hrs
00:00:01
23:59:59
Your Local Time
00:25:38
1 hrs
00:00:01
23:59:59

Area

CET Time

Time

00:25:38

CET Offset

1 hrs

Start Hour Max Daily Loss

00:00:01

End Hour Max Daily Loss

23:59:59

Area

FTMO Platform Time

Time

00:25:38

CET Offset

1 hrs

Start Hour Max Daily Loss

00:00:01

End Hour Max Daily Loss

23:59:59

Area

Your Local Time

Time

00:25:38

CET Offset

1 hrs

Start Hour Max Daily Loss

00:00:01

End Hour Max Daily Loss

23:59:59

Today’s permitted loss will reset in 23:32:20

Need support? Contact Us?

Introduction

BEM Software Development LLC-FZ (“BEM Funding”) is committed to maintaining the highest standards of anti-money laundering (“AML”) and counter-terrorist financing (“CTF”) compliance. This Anti-Money Laundering Policy outlines our comprehensive approach to detecting, deterring, and preventing money laundering and terrorist financing activities in accordance with the applicable laws and regulations of the United Arab Emirates (“UAE”), including Federal Decree-Law No. 26 of 2021 amending certain provisions of Law No. 20 for 2018 on Anti-Money Laundering and Combating the Financing of Terrorism and Illegal Organizations.

We recognize the critical importance of adhering to all relevant legal and regulatory requirements to maintain the integrity and reputation of BEM Funding This policy sets forth the principles and procedures that must be followed by all employees, officers, directors, and agents of BEM Funding, as well as any third-party service providers or contractors engaged by BEM Funding. This policy shall apply also on all of the subscribers of our platform.

This policy may be updated at any time to reflect changes in regulations, industry best practices, or the operational needs of BEM Funding. All updates will be communicated to the relevant parties promptly.

Purpose

The purpose of this Anti-Money Laundering Policy is to establish a robust framework for the prevention, detection, and reporting of money laundering and terrorist financing activities within BEM Funding. This policy aims to:

1. Ensure Compliance: Comply with all applicable laws and regulations related to anti-money laundering and counter-terrorist financing in the UAE, including Federal Decree-Law No. 26 of 2021 amending certain provisions of Law No. 20 for 2018.

2. Protect the Platform: Safeguard BEM Funding from being used as a conduit for money laundering or terrorist financing activities.

3. Promote Integrity: Uphold the integrity and reputation of BEM Funding by implementing effective AML controls and practices

4. Detect and Deter: Detect and deter suspicious activities that could be indicative of money laundering or terrorist financing

5. Provide Guidance: Provide clear guidelines and procedures for employees, officers, directors, agents, and third-party service providers to follow in order to prevent money laundering and terrorist financing activities.

6. Enhance Awareness: Raise awareness and educate all relevant parties about the importance of AML compliance and their roles in maintaining it.

Scope

This Anti-Money Laundering Policy applies to all employees, officers, directors, agents, and any third-party service providers or contractors engaged by BEM Funding. The policy covers all activities and services provided by BEM Funding and extends to all jurisdictions in which we operate.

The scope of this policy includes, but is not limited to:

1. Subscriber Identification and Verification: Procedures for identifying and verifying the identities of all subscribers before establishing business relationships.

2. Risk Assessment and Management: Processes for assessing and managing risks associated with money laundering and terrorist financing.

3. Transaction Monitoring: Mechanisms for monitoring subscriber transactions to detect and report suspicious activities.

4. Reporting Obligations: Procedures for reporting suspicious activities to the appropriate authorities in compliance with applicable laws and regulations.

5. Record Keeping: Requirements for maintaining records related to subscriber identification, transactions, and reports of suspicious activities.

6. Training and Awareness: Programs for training employees and raising awareness about AML and CTF requirements.

7. Internal Controls and Audits: Internal controls and periodic audits to ensure compliance with this policy and relevant laws.

This policy is intended to provide comprehensive guidelines to ensure that all relevant parties understand and fulfill their AML and CTF obligations in accordance with UAE laws and regulations.

Definitions

For the purposes of this Anti-Money Laundering Policy, the following terms shall have the meanings assigned to them below:

1. Money Laundering: The process by which criminals attempt to conceal the origins and ownership of the proceeds of their illicit activities, typically by means of complex financial transactions and integration into legitimate financial systems.

2. Terrorist Financing: The act of providing financial support, in any form, to terrorist individuals, groups, or activities. This includes the collection and provision of funds with the intention that they be used to support terrorist acts.

3. Subscriber Due Diligence (“CDD”): The process of identifying and verifying the identity of subscribers, understanding the nature of their activities, and assessing the risk of money laundering or terrorist financing associated with them.

4. Enhanced Due Diligence (“EDD”): Additional measures taken to verify the identity and assess the risks associated with high-risk subscribers, transactions, or activities that pose a higher risk of money laundering or terrorist financing.

5. Politically Exposed Persons (“PEPs”): Individuals who are or have been entrusted with prominent public functions, including heads of state, senior politicians, senior government officials, judicial or military officials, senior executives of state-owned corporations, and important political party officials. This definition also includes their family members and close associates.

6. Suspicious Activity Report (“SAR”): A report made to the relevant authorities by a financial institution or designated entity regarding suspicious or potentially suspicious activity that may indicate money laundering, terrorist financing, or other criminal activities.

7. Sanctions Lists: Lists of individuals, entities, and countries subject to economic or financial restrictions, issued by international organizations such as the United Nations, the UAE government, or other relevant authorities.

8. Risk-Based Approach: A method of assessing and mitigating the risks of money laundering and terrorist financing by applying appropriate measures commensurate with the level of risk identified.

9. Beneficial Owner: The natural person(s) who ultimately owns or controls a subscriber and/or the natural person on whose behalf a transaction is being conducted. This also includes those persons who exercise ultimate effective control over a legal person or arrangement.

10. Third-Party Service Providers: External entities engaged by BEM Funding to provide services or perform functions on behalf of [Platform Name], including contractors, consultants, and partners.

Subscriber Due Diligence (“CDD”)

BEM Funding is committed to implementing robust Subscriber Due Diligence measures to identify, verify, and understand our subscribers and their financial dealings. The following procedures outline our CDD process:

1. Identification and Verification:

- Individual Subscribers: Obtain and verify the full name, date of birth, nationality, residential address, and identification number (such as passport or national ID) of individual subscribers. Verification must be conducted using reliable, independent source documents, data, or information.

- Corporate Subscribers: Obtain and verify the legal name, address, registration number, and the identities of directors and beneficial owners of corporate subscribers. Verification must be conducted using official documents such as certificates of incorporation, articles of association, and beneficial ownership declarations.

2. Risk-Based Approach:

- Conduct a risk assessment for each subscriber based on factors such as the subscriber’s country of origin, the nature and purpose of the business relationship, transaction patterns, and the presence of any politically exposed persons (“PEPs”).

- Categorize subscribers into risk levels (low, medium, high) and apply appropriate levels of due diligence. Enhanced Due Diligence (“EDD”) must be applied to high-risk subscribers and transactions.

3. Ongoing Monitoring:

- Continuously monitor subscriber activities and transactions to detect unusual or suspicious behavior. This includes reviewing transaction records, patterns, and any changes in the subscriber’s profile or behavior.

- Conduct periodic reviews of subscriber information and documentation to ensure they remain accurate and up-to-date. Frequency of reviews should correspond to the subscriber’s risk level.

4. Enhanced Due Diligence (“EDD”):

- For high-risk subscribers or transactions, perform Enhanced Due Diligence, which includes obtaining additional information on the subscriber, the nature of the business relationship, and the source of funds. Senior management approval is required before establishing or continuing business relationships with high-risk subscribers.

- Regularly review and update EDD procedures to address evolving risks and regulatory requirements.

5. Politically Exposed Persons (PEPs):

- Identify and conduct enhanced due diligence on PEPs, their family members, and close associates. Obtain senior management approval before establishing or continuing business relationships with PEPs.

- Implement ongoing monitoring of PEPs to detect any changes in their risk profile or activities.

6. Record Keeping:

- Maintain comprehensive records of all subscriber identification and verification documents, risk assessments, and due diligence measures. These records must be kept for a minimum period of 5 years from the end of the business relationship or the date of the transaction.

- Ensure records are securely stored and easily retrievable for inspection by regulatory authorities.

7. Third-Party Reliance:

- In certain circumstances, BEM Funding may rely on third parties to perform CDD measures, provided that such third parties are regulated entities subject to equivalent AML regulations. BEM Funding remains ultimately responsible for ensuring that CDD requirements are met.

8. Training and Awareness:

- Provide regular training to employees on CDD procedures, the importance of accurate subscriber identification, and the identification of suspicious activities. Training should be tailored to the roles and responsibilities of staff.

Clause 6: Risk Assessment

BEM Funding is committed to a thorough risk assessment process to identify, evaluate, and mitigate risks associated with money laundering and terrorist financing. The following procedures outline our risk assessment process:

1. Risk Factors:

- Geographic Risk: Evaluate the risks associated with subscribers based in countries with high levels of corruption, terrorism, or weak AML regulations. Higher risk is associated with countries subject to international sanctions or identified by the Financial Action Task Force (FATF) as non-compliant.

- Subscriber Risk: Assess the risks based on the subscriber’s background, business activities, ownership structure, and behavior. Factors include the presence of Politically Exposed Persons (PEPs), high-net-worth individuals, or subscribers involved in high-risk industries.

- Service/Product Risk: Determine the risks related to the types of services or products offered by BEM Funding. Higher risk is associated with complex products, high-value transactions, and services with a high degree of anonymity.

- Transaction Risk: Analyze the risks associated with the nature and pattern of transactions. Factors include large, unusual, or complex transactions, frequent transfers between different accounts, and transactions involving high-risk jurisdictions.

- Delivery Channel Risk: Consider the risks associated with how services are delivered. Higher risk is associated with non-face-to-face transactions, third-party intermediaries, and new delivery channels.

2. Risk Assessment Methodology:

- Implement a structured methodology to assess and quantify the risks identified. This includes assigning risk scores to subscribers, products, transactions, and delivery channels based on predetermined criteria.

- Use risk assessment tools and software to support the identification and evaluation of risks.

3. Risk Mitigation:

- Apply appropriate measures to mitigate identified risks. This includes enhanced due diligence, stricter transaction monitoring, and implementing additional controls for higher-risk areas.

- Tailor risk mitigation strategies to the specific risks identified, ensuring that measures are proportionate to the level of risk.

4. Subscriber Risk Profiling:

- Develop and maintain risk profiles for all subscribers based on the risk assessment. Categorize subscribers into different risk levels (e.g., low, medium, high) and apply appropriate CDD measures.

- Regularly update subscriber risk profiles to reflect any changes in their risk factors or behavior.

5. Review and Update:

- Conduct regular reviews and updates of the risk assessment process to ensure it remains effective and aligned with evolving AML regulations and industry best practices.

- Update risk assessment methodologies and tools based on new information, regulatory changes, and emerging risks.

6. Documentation and Reporting:

- Document all risk assessments and the rationale behind risk classifications and mitigation measures. Ensure that records are maintained securely and are readily accessible for regulatory inspection.

- Report any significant risk findings and mitigation actions to senior management and the designated AML Compliance Officer.

7. Internal Audits:

- Perform regular internal audits of the risk assessment process to evaluate its effectiveness and compliance with this policy and applicable regulations. Address any identified deficiencies promptly.

Ongoing Monitoring

BEM Funding is committed to implementing robust ongoing monitoring processes to detect and prevent money laundering and terrorist financing activities. The following procedures outline our ongoing monitoring process:

1. Transaction Monitoring:

- Automated Systems: Utilize automated systems and software to continuously monitor subscriber transactions for unusual patterns, behaviors, and activities. These systems should be capable of generating alerts for transactions that exceed predefined thresholds or exhibit suspicious characteristics.

- Thresholds and Alerts: Establish transaction thresholds and parameters that trigger alerts for further investigation. Thresholds should be tailored to the specific risk profiles of subscribers and types of transactions.

2. Subscriber Reviews:

- Periodic Reviews: Conduct periodic reviews of subscriber accounts and transactions to ensure compliance with AML regulations and the accuracy of subscriber information. Frequency of reviews should be commensurate with the subscriber’s risk level.

- Enhanced Monitoring for High-Risk Subscribers: Implement enhanced monitoring procedures for high-risk subscribers, including more frequent reviews and deeper scrutiny of their transactions and activities.

3. Suspicious Activity Detection:

- Red Flags: Identify and document specific red flags and indicators of suspicious activities, such as large cash deposits, rapid movement of funds between accounts, and transactions involving high-risk jurisdictions.

- Investigation and Escalation: Investigate any alerts or red flags generated by the monitoring systems. Escalate potential suspicious activities to the designated AML Compliance Officer for further review and decision-making.

4. Updating Subscriber Information:

- Regular Updates: Ensure that subscriber information, including identification documents and risk profiles, is regularly updated and verified. Promptly update records to reflect any changes in the subscriber’s circumstances or behavior.

- Verification: Re-verify subscriber information periodically, especially for high-risk subscribers, to ensure its accuracy and completeness.

5. Reporting of Suspicious Activities:

- Internal Reporting: Require employees to report any suspicious activities to the designated AML Compliance Officer using a standardized internal reporting form.

- SAR Filing: Submit Suspicious Activity Reports (SARs) to the relevant authorities as required by law. Ensure that SARs are filed promptly and accurately, and that the confidentiality of SARs is maintained.

6. Record Keeping:

- Transaction Records: Maintain detailed records of all transactions, monitoring activities, and investigations. Ensure that records are kept for a minimum period 5 years and are securely stored.

- Audit Trails: Ensure that all monitoring activities and investigations are documented with clear audit trails, including the rationale for decisions and actions taken.

7. Training and Awareness:

- Employee Training: Provide ongoing training to employees on the importance of ongoing monitoring, the identification of suspicious activities, and the procedures for reporting and investigating such activities.

- Awareness Programs: Implement awareness programs to keep employees informed about the latest trends, typologies, and regulatory changes related to money laundering and terrorist financing.

8. Internal Audits:

- Regular Audits: Conduct regular internal audits of the ongoing monitoring process to assess its effectiveness and compliance with this policy and applicable regulations.

- Addressing Deficiencies: Promptly address any deficiencies identified during audits and implement corrective measures to improve the monitoring process.

Reporting of Suspicious Activities

BEM Funding is committed to detecting and reporting suspicious activities that may indicate money laundering or terrorist financing. The following procedures outline our reporting process:

1. Internal Reporting:

- Employee Responsibility: All employees are required to report any suspicious activities or transactions to the designated AML Compliance Officer immediately. Suspicious activities may include, but are not limited to, large or unusual transactions, transactions involving high-risk jurisdictions, and attempts to conceal the source or destination of funds.

- Standardized Reporting Form: Utilize a standardized internal reporting form to document and report suspicious activities. The form should include details such as the nature of the suspicious activity, the subscriber involved, the date and time of the activity, and any relevant supporting documentation.

2. Suspicious Activity Reports (SARs):

- Filing SARs: The AML Compliance Officer is responsible for reviewing internal reports of suspicious activities and determining whether a Suspicious Activity Report (SAR) should be filed with the relevant authorities. SARs must be filed promptly and in accordance with applicable legal and regulatory requirements.

- Confidentiality: Maintain the confidentiality of SARs and the information contained within them. Employees are prohibited from disclosing the existence or contents of a SAR to the subscriber involved or any unauthorized party. Any breach of confidentiality may result in disciplinary action and legal penalties.

3. Record Keeping:

- SAR Records: Maintain detailed records of all SARs filed, including the rationale for filing, supporting documentation, and any follow-up actions taken. These records must be kept for a minimum period of 5 years and must be securely stored.

- Internal Reports: Keep records of all internal reports of suspicious activities, even if a SAR is not ultimately filed. These records should include the reasons for not filing a SAR and any additional monitoring or actions taken.

4. Training and Awareness:

- Employee Training: Provide regular training to employees on identifying and reporting suspicious activities. Training should include examples of red flags, the use of the internal reporting form, and the importance of maintaining confidentiality.

- Continuous Education: Ensure that employees stay informed about changes in regulations, new typologies of money laundering and terrorist financing, and best practices for detecting and reporting suspicious activities.

5. Whistleblower Protection:

- Encouraging Reporting: Encourage employees to report suspicious activities without fear of retaliation. Implement measures to protect whistleblowers from adverse employment actions and ensure that their reports are handled confidentially.

- Confidential Reporting Channels: Provide multiple confidential reporting channels for employees, including options for anonymous reporting.

6. Review and Improvement:

- Periodic Review: Conduct periodic reviews of the reporting process to ensure its effectiveness and compliance with applicable regulations. Identify and address any deficiencies or areas for improvement.

- Feedback Mechanism: Implement a feedback mechanism for employees to suggest improvements to the reporting process. Regularly review and incorporate feedback to enhance the effectiveness of the process.

Record Keeping

BEM Funding is committed to maintaining comprehensive records related to its Anti-Money Laundering and Counter-Terrorist Financing efforts. The following procedures outline our record-keeping requirements:

1. Retention Period:

- Subscriber Identification Records: Maintain records of all subscriber identification documents and verification information for a minimum period of 5 years after the end of the business relationship or the date of the transaction.

- Transaction Records: Keep detailed records of all transactions, including the amount, date, parties involved, and nature of the transaction, for a minimum period of 5 years from the date of the transaction.

- SAR Records: Retain records of all Suspicious Activity Reports (SARs) filed and the internal reports that led to the filing of SARs for a minimum period of 5 years from the date of the report.

2. Types of Records:

- Subscriber Identification Documents: Include copies of passports, driver's licenses, utility bills, and any other documents used to verify the identity of subscribers.

- Transaction Records: Document details of deposits, withdrawals, transfers, and other financial transactions, including the purpose and destination of the funds.

- Monitoring and Investigation Records: Maintain logs of transaction monitoring alerts, investigations conducted, and actions taken in response to suspicious activities.

- SARs and Internal Reports: Include copies of SARs filed with authorities, internal reporting forms, and documentation supporting the decision to file or not file a SAR.

3. Secure Storage:

- Physical Records: Store physical records in secure, locked facilities with access restricted to authorized personnel only.

- Electronic Records: Ensure electronic records are stored in secure databases with appropriate encryption, access controls, and regular backups to prevent unauthorized access, alteration, or loss.

4. Accessibility:

- Ensure that all records are easily retrievable and available for inspection by regulatory authorities upon request. Implement systems and processes to facilitate quick access to required documentation.

5. Confidentiality:

- Maintain the confidentiality of all records related to AML and CTF efforts. Access to these records should be limited to authorized personnel who require the information to perform their duties.

- Ensure that information about SARs and related investigations is kept strictly confidential and not disclosed to unauthorized parties.

6. Internal Audits:

- Conduct regular internal audits to verify the completeness, accuracy, and security of records. Address any identified deficiencies promptly and implement corrective measures to ensure compliance with record-keeping requirements.

7. Compliance with Legal Requirements:

- Ensure that all record-keeping practices comply with applicable laws, regulations, and guidelines issued by regulatory authorities. Regularly review and update record-keeping procedures to reflect changes in legal requirements and industry best practices.

8. Disposal of Records:

- Implement procedures for the secure disposal of records that have reached the end of their retention period. Ensure that records are destroyed in a manner that prevents unauthorized access or retrieval of sensitive information.

Training and Awareness

BEM Funding is committed to providing comprehensive training and raising awareness about Anti-Money Laundering and Counter-Terrorist Financing among its employees and associated parties. The following procedures outline our training and awareness initiatives:

1. Employee Training:

- Mandatory Training: All employees, officers, directors, and agents of BEM Funding must undergo mandatory AML and CTF training upon hiring and at regular intervals thereafter. Training must be completed at least annually.

- Training Content: Training programs should cover relevant AML and CTF regulations, internal policies and procedures, identification and reporting of suspicious activities, subscriber due diligence (CDD), enhanced due diligence (EDD), and the use of transaction monitoring systems.

- Role-Specific Training: Training programs to the specific roles and responsibilities of employees. Provide additional, specialized training for employees in high-risk areas or with specific AML responsibilities, such as compliance officers and subscriber-facing staff.

2. Continuous Education:

- Ongoing Updates: Employees are regularly updated on changes in AML and CTF regulations, new typologies of money laundering and terrorist financing, and emerging threats. Provide updates through newsletters, bulletins, and refresher training sessions.

- Access to Resources: Make AML and CTF resources readily available to employees, including policy documents, training materials, regulatory updates, and industry best practices.

3. Awareness Programs:

- Internal Communications: Implement internal communications strategies to raise awareness about the importance of AML and CTF compliance. Use emails, intranet postings, and staff meetings to reinforce key messages and updates.

- Workshops and Seminars: Organize workshops and seminars led by AML experts and regulatory authorities to provide employees with deeper insights into AML and CTF issues and best practices.

4. Testing and Assessment:

- Knowledge Assessments: Conduct regular assessments to test employees’ understanding of AML and CTF policies and procedures. Use quizzes, exams, and scenario-based exercises to evaluate knowledge retention and application.

- Performance Reviews: Incorporate AML and CTF compliance into employee performance reviews. Evaluate employees based on their adherence to policies, participation in training, and ability to identify and report suspicious activities.

5. Feedback and Improvement:

- Employee Feedback: Encourage employees to provide feedback on training programs and suggest improvements. Use surveys and feedback forms to gather input and make necessary adjustments to training content and delivery methods.

- Continuous Improvement: Regularly review and update training programs to ensure they remain effective, relevant, and aligned with current regulations and industry standards. Implement improvements based on feedback and the results of assessments.

6. Documentation and Record Keeping:

- Training Records: Maintain comprehensive records of all training activities, including attendance logs, training materials, assessment results, and feedback. Ensure records are securely stored and easily retrievable for regulatory inspection.

- Compliance Reporting: Report on training activities as part of regular compliance updates to senior management and regulatory authorities. Include information on training completion rates, assessment outcomes, and areas for improvement.

Internal Controls and Compliance

BEM Funding is committed to maintaining a robust internal control environment and ensuring ongoing compliance with Anti-Money Laundering and Counter-Terrorist Financing regulations. The following procedures outline our internal controls and compliance measures:

1. AML Compliance Officer:

- Appointment: Appoint a qualified AML Compliance Officer responsible for overseeing the implementation and management of the AML program. The AML Compliance Officer should have the authority, resources, and independence to effectively carry out their duties.

- Responsibilities: The AML Compliance Officer's responsibilities include developing and updating AML policies, conducting risk assessments, overseeing subscriber due diligence and transaction monitoring, reporting suspicious activities, and providing training and guidance to employees.

2. Internal Controls:

- Policies and Procedures: Develop and maintain comprehensive AML policies and procedures that align with applicable laws and regulations. Ensure that these policies and procedures are regularly reviewed and updated to reflect changes in regulations and industry best practices.

- Segregation of Duties: Implement appropriate segregation of duties to prevent conflicts of interest and ensure effective oversight. Assign AML responsibilities to multiple individuals or departments to enhance accountability and control.

3. Risk-Based Approach:

- Risk Assessment: Conduct regular risk assessments to identify and evaluate the money laundering and terrorist financing risks associated with subscribers, products, services, transactions, and delivery channels. Apply appropriate risk mitigation measures based on the level of risk identified.

- Enhanced Due Diligence (EDD): Implement Enhanced Due Diligence (EDD) measures for high-risk subscribers and transactions. Ensure that EDD procedures are thorough and well-documented.

4. Transaction Monitoring:

- Automated Systems: Utilize automated systems and software to monitor transactions for unusual patterns, behaviors, and activities. Ensure that these systems are regularly updated and calibrated to detect new and emerging risks.

- Alert Management: Establish procedures for managing and investigating alerts generated by transaction monitoring systems. Ensure that alerts are promptly reviewed and appropriate actions are taken.

5. Audit and Review:

- Internal Audits: Conduct regular internal audits to assess the effectiveness of the AML program and compliance with policies and regulations. Audits should be conducted by independent, qualified personnel and cover all aspects of the AML program.

- Audit Findings: Address any deficiencies or areas for improvement identified during audits. Implement corrective measures and track their effectiveness over time.

6. Compliance Reporting:

- Regular Reporting: Provide regular compliance reports to senior management and the board of directors. Reports should include updates on the AML program, risk assessments, suspicious activity reports (SARs), training activities, and audit findings.

- Regulatory Reporting: Ensure timely and accurate reporting to regulatory authorities as required by law. This includes filing SARs, responding to regulatory inquiries, and providing periodic compliance updates.

7. Whistleblower Protection:

- Encouraging Reporting: Encourage employees to report any suspicious activities or breaches of the AML policy without fear of retaliation. Provide multiple channels for confidential reporting, including options for anonymous reporting.

- Protection Measures: Implement measures to protect whistleblowers from retaliation or adverse employment actions. Ensure that all reports are handled confidentially and investigated thoroughly.

8. Continuous Improvement:

- Feedback Mechanism: Implement a feedback mechanism for employees and stakeholders to suggest improvements to the AML program. Regularly review and incorporate feedback to enhance the effectiveness of the program.

- Adaptation to Change: Stay informed about changes in AML regulations, industry trends, and emerging risks. Continuously adapt the AML program to address new challenges and ensure ongoing compliance.

Third-Party Relationships

To the reasonable possibilities of [Platform Name], we to work on that all third-party service providers, partners, and contractors comply with Anti-Money Laundering (AML) and Counter-Terrorist Financing (CTF) regulations. The following procedures outline our approach to managing third-party relationships:

1. Due Diligence on Third Parties:

Initial Assessment: Conduct thorough due diligence on all third-party service providers, partners, and contractors before entering into a business relationship. This includes verifying their identity, ownership structure, reputation, and AML/CTF compliance programs.

Risk Assessment: Assess the AML/CTF risks associated with the third party based on factors such as their geographic location, nature of their business, and previous compliance history. Assign a risk level (low, medium, high) and apply appropriate due diligence measures.

2. AML Compliance Requirements:

- Contractual Obligations: Include specific AML/CTF compliance requirements in all contracts with third parties. These requirements should cover subscriber due diligence (CDD), transaction monitoring, reporting of suspicious activities, record-keeping, and training.

- Compliance Attestation: Require third parties to provide regular attestations or certifications confirming their compliance with AML/CTF regulations and the terms of the contract.

3. Ongoing Monitoring:

- Periodic Reviews: Conduct periodic reviews of third-party relationships to ensure ongoing compliance with AML/CTF regulations and contractual obligations. The frequency and depth of reviews should correspond to the risk level assigned to the third party.

- Performance Monitoring: Monitor the performance of third parties in meeting AML/CTF requirements, including their effectiveness in identifying and reporting suspicious activities.

4. Reporting of Suspicious Activities:

- Internal Reporting: Require third parties to report any suspicious activities related to their dealings with BEM Funding to the designated AML Compliance Officer promptly.

- SAR Filing: Ensure that third parties understand their obligations to file Suspicious Activity Reports (SARs) with the relevant authorities as required by law.

5. Training and Awareness:

- Third-Party Training: Provide AML/CTF training to third-party service providers, partners, and contractors as part of the onboarding process and at regular intervals thereafter. Training should cover relevant regulations, internal policies, and the identification and reporting of suspicious activities.

- Access to Resources: Ensure third parties have access to AML/CTF resources, including policy documents, training materials, and regulatory updates.

6. Termination of Relationships:

- Non-Compliance: Terminate relationships with third parties that fail to comply with AML/CTF regulations or the terms of the contract. Ensure that termination processes are documented and that any ongoing risks are mitigated.

- Exit Strategy: Develop and implement an exit strategy for terminating third-party relationships that includes transitioning services, protecting sensitive information, and addressing any outstanding compliance issues.

7. Documentation and Record Keeping:

- Third-Party Records: Maintain comprehensive records of all due diligence, risk assessments, performance reviews, and communications with third parties. Ensure records are securely stored and easily retrievable for regulatory inspection.

- Audit Trails: Ensure that all interactions with third parties are documented with clear audit trails, including the rationale for decisions and actions taken.

8. Compliance Audits:

- Regular Audits: Conduct regular audits of third-party relationships to assess their compliance with AML/CTF requirements and the effectiveness of their AML programs.

- Addressing Deficiencies: Promptly address any deficiencies identified during audits and implement corrective measures to improve third-party compliance.

Suspicious Activity Red Flags

BEM Funding is dedicated to identifying and investigating suspicious activities that may indicate money laundering or terrorist financing. The following procedures outline common red flags and the process for addressing them:

1. Transaction Red Flags:

- Unusual Transaction Patterns: Large, frequent, or unexplained deposits or withdrawals that do not align with the subscriber’s known business or personal activities.

- Rapid Movement of Funds: Quick transfers of funds between accounts, particularly those involving high-risk jurisdictions or multiple international transfers.

- Structuring/Smurfing: Transactions designed to avoid reporting thresholds, such as breaking down large amounts into smaller, less suspicious increments.

- Inconsistent Transactions: Transactions that are inconsistent with the subscriber’s usual pattern of activity or financial profile.

2. Subscriber Behavior Red Flags:

- Reluctance to Provide Information: Subscribers who are unwilling or hesitant to provide required identification documents or other information.

- Suspicious Documentation: Identification documents that appear to be forged, altered, or otherwise suspicious.

- Attempts to Avoid Reporting: Subscribers who attempt to persuade employees not to report certain transactions or who inquire about reporting thresholds and procedures.

- Unusual Account Activity: Frequent changes in account ownership, signatories, or power of attorney arrangements without a clear business justification.

3. Geographic Red Flags:

- High-Risk Jurisdictions: Transactions involving countries with high levels of corruption, terrorism, or weak AML regulations, as identified by the Financial Action Task Force (FATF) or other relevant authorities.

- Sanctioned Countries: Transactions involving individuals or entities from countries subject to international sanctions or embargoes.

4. Other Red Flags:

- Use of Third Parties: Transactions conducted through intermediaries or third parties with no clear business justification, especially those involving cash or bearer instruments.

- Unusual Loan Requests: Loan requests that are not consistent with the subscriber’s financial status or business operations, or that involve collateral of questionable value.

5. Investigation and Escalation:

- Initial Review: Employees must report any red flags or suspicious activities to the designated AML Compliance Officer immediately. The AML Compliance Officer will conduct an initial review of the reported activity.

- Further Investigation: If the initial review indicates potential money laundering or terrorist financing, the AML Compliance Officer will initiate a formal investigation. This may involve gathering additional information, interviewing relevant parties, and analyzing transaction records.

- Escalation to Authorities: If the investigation confirms suspicious activity, the AML Compliance Officer will escalate the matter by filing a Suspicious Activity Report (SAR) with the relevant authorities. The decision to file a SAR and the supporting rationale must be documented.

6. Documentation and Record Keeping:

- Red Flag Documentation: Maintain detailed records of all identified red flags, investigations conducted, and actions taken. Ensure that records are kept for a minimum period of 5 years and are securely stored.

- SAR Records: Retain copies of all SARs filed and related documentation, including the rationale for filing and any follow-up actions taken.

7. Training and Awareness:

- Employee Training: Provide regular training to employees on identifying red flags and reporting suspicious activities. Training should include real-life examples and case studies to enhance understanding.

- Continuous Education: Keep employees informed about new red flags, emerging threats, and changes in AML regulations through ongoing education and updates.

8. Review and Improvement:

- Periodic Review: Conduct periodic reviews of the red flags identification process to ensure its effectiveness and alignment with regulatory requirements. Update the list of red flags as needed based on new information and industry trends.

- Feedback Mechanism: Implement a feedback mechanism for employees to report challenges and suggest improvements to the red flags identification process. Regularly review and incorporate feedback to enhance the process.

Whistleblower Protection

BEM Funding is committed to fostering a culture of compliance and transparency by encouraging the reporting of suspicious activities and ensuring the protection of whistleblowers. The following procedures outline our whistleblower protection policy:

1. Encouraging Reporting:

- Reporting Channels: Provide multiple confidential channels for employees, officers, directors, agents, and third-party service providers to report suspicious activities or breaches of the AML policy. These channels may include anonymous hotlines, secure email addresses, and online reporting forms.

- Clear Guidelines: Ensure that all employees and associated parties are aware of the procedures for reporting suspicious activities and the importance of doing so. Provide clear guidelines and training on how to identify and report potential money laundering and terrorist financing activities.

2. Confidentiality:

- Confidential Handling: Treat all reports of suspicious activities with the utmost confidentiality. Ensure that the identity of the whistleblower is protected and that information is only shared with individuals who need to know in order to investigate and address the report.

- Anonymous Reporting: Allow for anonymous reporting to encourage individuals who may fear retaliation to come forward. Ensure that anonymous reports are treated with the same level of seriousness and confidentiality as identified reports.

3. Protection Measures:

- No Retaliation: Implement strict policies prohibiting retaliation against individuals who report suspicious activities in good faith. This includes protection from adverse employment actions, harassment, and any other form of retaliation.

- Support Mechanisms: Provide support mechanisms for whistleblowers, including counseling services and legal assistance if needed. Ensure that whistleblowers feel safe and supported throughout the reporting and investigation process.

4. Investigation of Reports:

- Prompt Investigation: Investigate all reports of suspicious activities promptly and thoroughly. The designated AML Compliance Officer is responsible for overseeing investigations and ensuring that they are conducted impartially and effectively.

- Documentation: Maintain detailed records of all reports received, investigations conducted, and actions taken. Ensure that these records are securely stored and accessible for regulatory inspection if needed.

5. Feedback to Whistleblowers

- Acknowledgment of Reports: Acknowledge receipt of reports to whistleblowers (if their identity is known) and provide updates on the status of the investigation, while maintaining confidentiality.

- Outcome Communication: Inform whistleblowers of the outcome of the investigation once it is concluded, to the extent possible without compromising confidentiality or ongoing investigations.

6. Training and Awareness:

- Employee Training: Provide regular training to employees on the whistleblower protection policy, including how to report suspicious activities, the protections available to whistleblowers, and the importance of reporting in maintaining compliance.

- Awareness Campaigns: Implement awareness campaigns to promote the whistleblower protection policy and encourage a culture of transparency and accountability within the organization

7. Review and Improvement:

- Policy Review: Conduct regular reviews of the whistleblower protection policy to ensure its effectiveness and alignment with regulatory requirements. Update the policy as needed based on feedback, changes in regulations, and best practices.

- Feedback Mechanism: Implement a feedback mechanism for employees to provide input on the whistleblower protection policy and suggest improvements. Regularly review and incorporate feedback to enhance the policy.

Confidentiality

BEM Funding is committed to maintaining the confidentiality of all information related to its Anti-Money Laundering and Counter-Terrorist Financing efforts. The following procedures outline our confidentiality requirements:

1. Data Protection:

- Confidential Information: Ensure that all information obtained during Subscriber Due Diligence, Enhanced Due Diligence, transaction monitoring, and investigations is treated as confidential. This includes subscriber identification documents, transaction records, internal reports, and Suspicious Activity Reports (SARs).

- Access Controls: Implement strict access controls to ensure that only authorized personnel have access to confidential information. Use role-based access permissions to limit access based on the individual's role and responsibilities.

2. Storage and Security:

- Secure Storage: Store all physical records in locked, secure facilities with restricted access. Ensure that electronic records are stored in secure databases with encryption, regular backups, and access controls

- Data Encryption: Use strong encryption methods for storing and transmitting sensitive information to protect against unauthorized access, alteration, or loss.

3. Disclosure Restrictions:

- Non-Disclosure: Prohibit the disclosure of SARs and any information related to an investigation of suspicious activities to unauthorized parties, including the subscriber involved. Ensure that employees understand the importance of maintaining confidentiality and the legal implications of unauthorized disclosure.

- Legal Compliance: Comply with all legal requirements regarding the confidentiality of subscriber information and SARs. Ensure that disclosures to regulatory authorities are conducted in accordance with applicable laws and regulations.

4. Internal Controls:

- Confidentiality Agreements: Require employees, contractors, and third-party service providers to sign confidentiality agreements as a condition of their engagement. These agreements should outline their obligations to maintain the confidentiality of sensitive information and the consequences of unauthorized disclosure.

- Audit Trails: Maintain audit trails of all access to and disclosures of confidential information. Ensure that audit trails are regularly reviewed to detect and address any unauthorized access or breaches.

5. Training and Awareness:

- Employee Training: Provide regular training to employees on the importance of confidentiality, data protection, and the proper handling of sensitive information. Training should include real-life scenarios and examples to enhance understanding.

- Confidentiality Policies: Make confidentiality policies and procedures readily accessible to all employees. Ensure that employees are aware of their responsibilities and the steps they must take to protect confidential information.

6. Incident Response:

- Breach Reporting: Establish procedures for reporting and responding to breaches of confidentiality. Employees must report any suspected or actual breaches immediately to the designated AML Compliance Officer.

- Investigation and Remediation: Conduct prompt investigations of reported breaches and take appropriate remedial actions to mitigate any harm. Implement measures to prevent future breaches and enhance data protection.

7. Review and Improvement:

- Policy Review: Conduct regular reviews of the confidentiality policy to ensure its effectiveness and alignment with regulatory requirements. Update the policy as needed based on feedback, changes in regulations, and best practices.

- Feedback Mechanism: Implement a feedback mechanism for employees to provide input on confidentiality practices and suggest improvements. Regularly review and incorporate feedback to enhance data protection and confidentiality measures.

Review and Updates

BEM Funding is committed to ensuring that its Anti-Money Laundering (AML) and Counter-Terrorist Financing (CTF) policies remain current, effective, and compliant with applicable laws and regulations. The following procedures outline our approach to reviewing and updating the AML Policy:

1. Regular Policy Review:

- Annual Review: Conduct a comprehensive review of the AML Policy at least once annually to ensure its alignment with current legal requirements, regulatory guidelines, and industry best practices.

- Regulatory Changes: Review and update the policy whenever there are significant changes to relevant laws, regulations, or guidance issued by regulatory authorities. Ensure that updates are implemented promptly to maintain compliance.

2. Internal Feedback:

- Employee Feedback: Encourage employees to provide feedback on the AML Policy and its implementation. Use surveys, feedback forms, and regular meetings to gather input on potential improvements and areas of concern.

- Compliance Officer Input: The AML Compliance Officer should provide regular feedback on the effectiveness of the policy, based on their oversight of AML activities and internal audits.

3. External Consultation:

- Expert Consultation: Consult with external AML experts, legal advisors, and industry peers to obtain insights and recommendations for improving the AML Policy. Stay informed about emerging trends and developments in AML and CTF practices.

- Regulatory Guidance: Engage with regulatory authorities to seek clarification on new requirements and to ensure that the policy remains in full compliance with applicable regulations.

4. Implementation of Updates:

- Policy Updates: Implement updates to the AML Policy as needed, based on the results of the regular review, internal feedback, and external consultation. Ensure that updates are documented and communicated effectively to all relevant parties.

- Training on Updates: Provide training to employees on any changes to the AML Policy. Ensure that employees understand the updated requirements and procedures, and are equipped to implement them effectively.

5. Communication of Updates:

- Internal Communication: Communicate updates to the AML Policy to all employees, officers, directors, agents, and third-party service providers. Use multiple communication channels, such as email, intranet postings, and staff meetings, to ensure widespread awareness.

- External Communication: Inform subscribers and relevant external stakeholders of any significant changes to the AML Policy that may affect their interactions with [Platform Name]. Ensure that updated policy documents are accessible on the company’s website.

6. Documentation and Record Keeping:

- Policy Version Control: Maintain version control of the AML Policy, documenting the date and nature of each update. Ensure that historical versions are archived and accessible for reference and regulatory inspection.

- Audit Trails: Keep detailed records of the review and update process, including the rationale for changes and the steps taken to implement them. Ensure that audit trails are maintained for accountability and transparency.

7. Effectiveness Assessment:

- Ongoing Evaluation: Continuously evaluate the effectiveness of the AML Policy and its implementation. Use metrics, internal audits, and compliance reviews to assess whether the policy is achieving its objectives and to identify areas for improvement.

- Corrective Actions: Implement corrective actions to address any deficiencies identified during the effectiveness assessment. Monitor the impact of these actions to ensure continuous improvement.

Closing Statement

BEM Funding is steadfast in its commitment to maintaining the highest standards of Anti-Money Laundering and Counter-Terrorist Financing compliance. This AML Policy outlines our comprehensive approach to detecting, deterring, and preventing money laundering and terrorist financing activities.

All the subscribers, employees, officers, directors, agents, and third-party service providers of BEM Funding are expected to adhere to this policy and fulfill their responsibilities in safeguarding the integrity and reputation of our platform.