Skip to main content
All CollectionsPrivacy Policy
Bityi Anti-Money Laundering (AML) and Counter-Terrorism Financing (CTF) User Guidelines

Bityi Anti-Money Laundering (AML) and Counter-Terrorism Financing (CTF) User Guidelines

B
Written by BitYi Official
Updated over 2 months ago

1. Purpose and Basis

Money laundering seriously endangers the development of digital asset trading, promotes corruption, damages user rights, and increases the legal and operational risks for trading platforms. Bityi has developed this guide to prevent money laundering (ML) and terrorist financing (TF) and to fully comply with AML and CTF laws and regulations.


2. Scope of Application

This guide applies to all registered users of Bityi platform (hereinafter referred to as "the platform").

  • Users must comply with AML and CTF laws in their respective countries or regions.

  • If stricter regulations exist in a user’s location, they must follow those requirements.


3. Definition of AML and CTF

AML and CTF measures prevent criminals from using the platform to conceal the source and nature of illicit funds, including but not limited to:

  • Drug-related crimes

  • Organized crime activities

  • Terrorist financing

  • Smuggling crimes

  • Corruption and bribery

  • Financial fraud

  • Disrupting financial order

Bityi takes appropriate measures in accordance with laws and regulations to prevent these activities.


4. Fundamental AML Principles

Bityi applies the following risk control principles:

Comprehensiveness – Assess all potential ML/TF risk factors and implement reasonable monitoring.
Prudence – Strengthen customer identification to ensure the legitimacy of funds.
ContinuityContinuously monitor user activity and adjust measures as needed.
ConfidentialityUser identity and transaction information are kept strictly confidential and will only be disclosed per legal or regulatory requirements.
Tiered Management

  • Regularly review customer records.

  • Higher-risk users undergo stricter scrutiny.


5. User Documentation Review

  • Bityi verifies customer-submitted information under its AML policies.

  • If discrepancies arise, Bityi reserves the right to verify data with regulatory authorities.


6. Monitoring Low-Risk Users

  • The platform will monitor low-risk users based on AML policy and may adjust their risk level as needed.


7. Monitoring High-Risk Users

  • High-risk users are reviewed every 6 months, updating:

    • Identity verification

    • Fund sources & usage

    • Financial or business status


8. User Responsibilities

Users must comply with the following:

Do not rent, lend, or disclose account credentials;
Do not rent or lend identity documents;
Do not allow third-party access to personal accounts;
Users must cooperate with identity verification requirements.


9. Reporting Suspicious Activities

  • If users identify suspicious transactions related to ML or TF, they should report them to Bityi.

Bityi complies with legal investigations and enforces penalties for non-compliant accounts.

Did this answer your question?