Unlimited Cloud LLC

Bank Secrecy Act (BSA)
Anti-Money Laundering (AML) &
Know Your Customer (KYC) Policy

Introduction

Unlimited Cloud LLC (“Unlimited Remit”, “Unlimited” or “the Company”) aims to prohibit, detect and actively pursue the prevention of money laundering and terrorism financing activities and vows to comply with all related laws, rules and regulations with full attention and no compromise with any of the above-mentioned illegal activities.

The management of the Company is committed to Anti-Money Laundering (“AML”), Counter Terrorism Financing (“CFT”) compliance in accordance with applicable laws and places extremely high importance on assisting in discovering any money laundering scheme and/or terrorism financing activities. 

Unlimited Cloud LLC also requires its officers, employees, introducing brokers and payout agents and affiliated companies to adhere to these standards in preventing the use company’s products and services for the purposes of money laundering and terrorism financing activities. 

It is Unlimited Cloud LLC’s policy to prohibit and actively prevent money laundering and any activity that facilitates money laundering or the funding of terrorist or criminal activities by working with our financial software provider Sila Inc. (“Sila”) and banking partner(s) to comply with all applicable requirements under the Bank Secrecy Act (“BSA”), the USA PATRIOT Act (the “Patriot Act”), and their implementing regulations. 

Money laundering means any activity that is meant to conceal or disguise the origins of criminally derived proceeds to appear to constitute legitimate assets. A criminal will typically achieve money laundering in three stages. At the "placement" stage, the criminal converts cash generated by illicit means into monetary instruments or deposits it into accounts maintained by otherwise legitimate businesses at financial institutions. At the "layering" stage, the criminal transfers or moves the funds into other accounts or other financial institutions to put greater distance between the money and its criminal origins. At the "integration" stage, the criminal reintroduces the funds into the economy, using them to purchase legitimate assets or fund other criminal activities or legitimate businesses. 

Financial technology firms that process transactions for their customers are uniquely situated in an evolving technological, financial, and regulatory landscape. Such a firm must always anticipate that its customers or their counterparties could be attempting to launder funds obtained elsewhere or generate illicit funds on the financial technology platform itself. [Include a clear statement outlining your specific business model and recognizing the potential ways in which a customer or its counterparties could take advantage of your platform to launder funds.] 

Unlike money laundering, terrorist financing does not necessarily involve the proceeds of criminal conduct. The funding sources of terrorist financiers are often legitimate. Terrorist financing typically involves an attempt to conceal either the origin of the funds or their intended use, which could be for criminal purposes. Legitimate sources of terrorist financing can include charitable donations, foreign government sponsors, business ownership, and personal employment. Although the motivation differs between traditional money launderers and terrorist financiers, the actual methods used to fund terrorist operations can look similar to methods used by other criminals to launder funds. Funding for terrorist attacks does not always require large sums of money and the associated transactions may not be complex. 

This Bank Secrecy Act and Anti-Money Laundering Policy (“BSA/AML Policy”) and our procedures and internal controls for implementing the policy are designed to ensure compliance with all applicable laws and regulations. We will review and update this BSA/AML Policy on a regular basis and put in place appropriate procedures and internal controls to account for both regulatory changes and changes in our business. 

2 Purpose

The purpose of “BSA, AML, CFT & KYC Policy”, (“the Policy”), is to provide guidance on the Bank Secrecy Act (BSA, Anti-Money Laundering (“AML”), Counter Terrorism Financing (“CFT”), and Know your Customer (“KYC") procedures which are followed by the Company in order to achieve full compliance with the relevant BSA, AML and CTF legislation. 

This policy applies to all Company’s officers, employees, introducing brokers, affiliated companies, and products and services offered by the Company. Any employee found not to be adhering to these policies and procedures will face severe disciplinary action. 

3 Legal Framework 

The Company is required to comply with the provisions of the applicable laws regarding the prevention of Money Laundering and Terrorist Financing. The main purpose of these Laws is to define and criminalize the laundering of proceeds generated from all serious criminal offences aiming at depriving criminals from the profits of their crimes. 

In accordance with the AML and CTF Laws, the Company is obliged to set out policies and procedures for preventing money laundering and Terrorist Financing activities. 

The AML and CFT procedures, which are implemented by the Company, are based on AML and CFT laws applicable in Saint Vincent, the recommendations of The Financial Action Task Force (FATF), in addition to other documents and information. 

4 Definitions

4.1 Money Laundering

Money laundering is the process of creating the appearance that large amounts of money obtained from serious crimes, such as drug trafficking or terrorist activity, originated from a legitimate source. 

There are three steps involved in the process of laundering money: Placement, Layering and Integration. 

4.1.1 Placement
Placement refers to the act of introducing "dirty money" (money obtained through illegitimate, criminal means) into the financial system in some way. 

4.1.2 Layering
Layering is the act of concealing the source of that money by way of a series of complex transactions and bookkeeping gymnastics. 

4.1.3 Integration
Integration refers to the act of acquiring that money in purportedly legitimate means. 

4.2 Terrorism Financing 

Terrorist financing (proceeds for crime) is the process by which funds are provided for financing or financial support to individual terrorists or terrorist groups. 

A terrorist, or terrorist group, is one that has a purpose or activity to facilitate or carry out any terrorist action and can involve: individuals or groups. 

4.3 AML/CTF 

The term AML CTF refers to “Anti Money Laundering and Counter Terrorism Financing” or “Anti Money Laundering and Combating Terrorism Financing”. 

4.3.1 Anti-Money Laundering 

Anti-Money Laundering (“AML”) refers to a set of procedures, laws or regulations designed to stop the practice of generating income through illegal actions. 

4.3.2 Counter Terrorism Financing 

Counter Terrorism Financing (“CTF”) refers to a set of procedures, laws or regulations designed to prevent financing or providing financial support to individual terrorists or terrorist groups. 

4.4 Financial Action Task Force (FATF) 

The Financial Action Task Force on Money Laundering (“FATF”), also known by its French name, Groupe d'action financière (GAFI), is an intergovernmental organization established in July 1989 by a Group of Seven (G-7) Summit in Paris, initially to examine and develop measures to combat money laundering. 

In October 2001, the FATF expanded its mandate to incorporate efforts to combat terrorist financing, in addition to money laundering. 

The objectives of the FATF are to set standards and promote effective implementation of legal, regulatory and operational measures for combating money laundering, terrorist financing and other related threats to the integrity of the international financial system. 

Starting with its own members, the FATF monitors countries' progress in implementing the FATF Recommendations; reviews money laundering and terrorist financing techniques and counter-measures; and, promotes the adoption and implementation of the FATF Recommendations globally. 

The Task Force was given the responsibility of examining money laundering techniques and trends, reviewing the action which had already been taken at a national or international level, and setting out the measures that still needed to be taken to combat money laundering. 

In April 1990, less than one year after its creation, the FATF issued a report containing a set of Forty Recommendations, which were intended to provide a comprehensive plan of action needed to fight against money laundering. 

In 2001, the development of standards in the fight against terrorist financing was added to the mission of the FATF. 

In October 2001, the FATF issued the Eight Special Recommendations to deal with the issue of terrorist financing. The continued evolution of money laundering techniques led the FATF to revise the FATF standards comprehensively in June 2003.

In October 2004, the FATF published a Ninth Special Recommendations, further strengthening the agreed international standards for combating money laundering and terrorist financing - the 40+9 Recommendations.

In February 2012, the FATF completed a thorough review of its standards and published the revised FATF Recommendations. This revision is intended to strengthen global safeguards and further protect the integrity of the financial system by providing governments with stronger tools to take action against financial crime. They have been expanded to deal with new threats such as the financing of proliferation of weapons of mass destruction, and to be clearer on transparency and tougher on corruption. The 9 Special Recommendations on terrorist financing have been fully integrated with the measures against money laundering. This has resulted in a stronger and clearer set of standards. 

5 Procedures 

The provisions of the Laws adopted by the Company introduces procedures and processes that ensure compliance with the applicable Laws related to Money Laundering and Terrorism Financing activities. 

5.1 Client Categorization and Identification Procedures 

The Company has adopted all requirements of the applicable laws in relation to client categorization and identification and due diligence procedures as explained below: 

5.1.1 Client Categorization 

Clients are categorized based on their risk profile into three main categories as explained below: 

a Low Risk Clients 

The following types of clients are considered lower risk. It should be noted that the Company shall gather enough information to establish if the client qualifies to be classified as lower risk client: 

i- Credit or financial institutions situated in another country which imposes requirements higher or equivalent to those laid down by Company’s regulators. 

ii- Listed companies whose securities are admitted to trading on a regulated market of other countries which are subject to disclosure requirements consistent with Community legislation. 

B Normal Risk Clients 

All clients who do not fall under either High Risk or Low risk category will be considered as Normal Risk Clients. 

c- High Risk Clients 

Clients with the following criteria are classified as High risk due to the following conditions:

i- Non face to face customers 

ii- Client accounts in the name of a third person 

iii- Politically exposed persons (“PEP”) accounts 

iv- Electronic gambling /gaming through the internet 

v- Customers from countries which inadequately apply FATF’s recommendations 

vi- Clients that their nature entail a higher risk of money laundering and terrorist financing 

vii- Any other Client determined by the Company itself to be classified as such 

5.1.2 Client Identification (Due Diligence) 

A Due Diligence Conditions 

The Client Identification and Due diligence procedures are applied in the following conditions: 

i- Establishing a business relationship. 

ii-There is a suspicion of money laundering or terrorist financing, irrespective of the transaction amount. 

iii- There are doubts about the adequacy of previously obtained client identification data. 

iv- Failure or refusal by a client to submit the requisite data and information for the verification of his/her identity and the creation of his/her economic profile, without adequate justification. 

b- Due Diligence Timing 

i- Client identification and due diligence must take place before the establishment of a business relationship or the carrying out of a transaction. 

ii- The verification of the identity of the client may be completed during the establishment of a business relationship if this is necessary in order not to interrupt the normal conduct of business and where there is limited risk of money laundering or terrorist financing occurring. In such situation, these procedures need to be completed as soon as possible. 

iii- Reviews of existing records must take place on a regular basis, thus ensuring that the documents, data or information held are up-to-date.

iv- Client due diligence procedures shall be applied not only to all new clients but also at appropriate times to existing clients on a risk sensitive basis. 

v- When a client’s account is opened, it should be closely monitored. 

vi- A review should be carried out, at least twice a year, and a note prepared summarizing the results of the review, which must be kept in customer’s file. 

vii- At frequent intervals, the Company should compare the estimated against the actual turnover of the account. 

viii- Any serious deviation, should be investigated, not only for possible action by the Company in relation to the particular account concerned, but also to gauge the reliability of the person or entity who has introduced the customer. 

c- Due Diligence Procedures 

The practice to which the Company adheres in order to comply with the requirements of the Law on the subject of the client identification is achieved on a risk-based approach and it is set out below: 

i- Normal Client Due Diligence Procedure 

Normal Due Diligence procedure applies for normal risk clients and shall comprise the following: 

• Identification of the client and verification of the client’s identity on the basis of information obtained from a reliable and independent source. 

• For legal persons, taking risk-based and adequate measures to understand the ownership and control structure of the client. 

• Obtaining information on the purpose and intended nature of the business relationship. 

• Conducting ongoing monitoring of the business relationship including scrutiny of transactions undertaken throughout the course of the relationship to ensure that the transactions being conducted are consistent with the data and information held by the firm in connection with the client. 

ii- Simplified Client Due Diligence Procedure 

Simplified procedures may apply for low risk clients. These measures shall apply when there is no suspicion of money laundering, regardless of any derogation, exemption or threshold, and not whenever a business relationship is established. 

iii- Enhanced Client Due Diligence Procedure 

The Company should apply enhanced client due diligence measures in situations which by nature can present high risk of money laundering or terrorist financing. 

The Company shall take specific and adequate measures to compensate for the high risk, by applying one or more of the following measures: 

• Ensure that the client’s identity is established by additional documents, data or information. 

• Apply supplementary measures to verify or certify the documents supplied. 

• Ensure that the first payment of the operations is carried out through an account opened in the client’s name with a credit institution which operates in a country of which imposes requirements higher or equivalent to those laid down by Company’s regulators. 

d- Verification Procedure 

The following verification procedure will be followed by the Company in order to verify the identity of the client during the establishment of the business relationship: 

i- The Company will ensure that the construction of the economic profile, assessment of appropriateness and assessment of suitability shall be performed at all times prior the establishment of the business relationship. 

ii- The clients are provided with a grace period of fifteen (15) days to provide the Company with their identification documents; During the 15 days’ period the Company is required to ensure for the following: 

• The cumulative amount of funds to be deposited will not exceed the amount of USD 2,000. 

• The funds may come only from a bank account or through other means that are linked to a bank account in the name of the client. 

• Notification / Reminder emails will be sent to the clients requesting to be provided with the client’s identification documents. 

• Closure of the account in cases where the verification procedure is not concluded following the completion of the period. 

• The Company shall not withhold any clients’ funds and no accounts shall be frozen unless there is a suspicion of money laundering. 

e- Other Due Diligence related matters 

i- Politically exposed persons 

Politically Exposed Persons (“PEPs”) are individuals who are or have been entrusted with prominent public functions in a foreign country and close associate is someone with a close relationship with the political exposed persons. 

The Company should adopt the following additional due diligence measures to determine whether a prospective client is a politically exposed person: 

• - Special Approval from Senior Management prior to the establishment of a business relationship with the client. 

• - Take appropriate measures for the establishment of the origin of the client’s assets and the source of funds that are related with the establishment of the business relationship or transaction. 

• - Conduct enhanced and continuous monitoring of the business relationship. 

ii- Anonymous or Numbered Accounts 

The Company is prohibited from keeping anonymous or numbered accounts. Additionally, the Company shall pay special attention to any money laundering or terrorist financing threat that may arise from products or transactions that might favour anonymity and take measures to prevent their use for money laundering or terrorist financing purposes. 

iii- Due Diligence Performance by Third Parties 

The Company is permitted to and may rely on third parties to meet the requirements for client due diligence. However, in the such cases, the ultimate responsibility for meeting those requirements shall remain with the Company which relies on the third party. 

5.2- Client Account Opening and KYC Documentation Procedures 

Prior to accepting new clients, the company requires these clients to provide certain information and documentation for the purpose of client identifications and the verification of client identity. 

5.2.1- Account Opening 

a- Required Information for Account Opening 

All clients interested in opening an account with the Company are requested to provide certain information including: 

i- The Client’s personal details 

ii- The Construction of Economic Profile for the Client 

iii- The Client’s Appropriateness/Suitability Assessment 

It is obvious that the identification of the client including construction of economic profile and appropriateness/suitability assessment shall take place prior the establishment of the business relationship with the client. 

b- Account Opening Procedure 

i- The client completes the account opening forms indicating all required information. 

ii- The responsible administrator collects all initial information of the client and forwards it directly to Senior Management and to the Anti-Money Laundering Compliance Officer for examination, review and approval. 

iii- Following the approval, the administrator records all necessary information into the Company’s software systems and communicates it to the related departments. 

5.2.2- KYC Documentation 

Prior to accepting new clients and allowing them to trade with the Company, the following documents shall be obtained for the verification of clients’ identity: 

a- Natural Persons 

The identification documents required from natural persons (Individual clients) in order to efficiently implement the Company’s KYC procedures are as follows: 

i- Proof of Identity 

A Valid government-issued Proof of Identity, (Passport, National ID Card, Driving License, …) which should include Client’s Full Name, Client’s Date of Birth, Client’s Photograph, and Validity Status (Date of Expiry and/or Date Issuance + Validity Period)

Unlimited Cloud LLC has established, documented, and is committed to maintaining a written Customer Identification Program (“CIP”), which includes procedures for Know-Your-Customer/Business (“KYC/KYB”) compliance. We will collect certain minimum customer identification information from every customer who opens an account on our platform. We will: apply risk-based measures to verify the identity of each customer who opens an account; record customer identification information and our verification methods and results; provide adequate CIP notice to customers stating why we need identification information to verify their identities; and compare customer identification information with the OFAC SDN List.

Before an individual or business customer opens an account for access to our platform, the company will collect the following information: full name, street address, phone number, and email address. If there is a mismatch involved with verifying the minimal information provided above or before the customer may be granted platform access to send or receive more than $299 a week in aggregate or maintain money balances, we will additionally collect the following information as required by law (if not already collected preliminarily):

(1) birthdate (for an individual); and

(2) an identification number or other documentary ID, which— 

(a) for a U.S. person, will be a taxpayer identification number (“TIN”); and

(b) for a non-U.S. person, will be one or more of the following: a TIN, passport number and country of issuance, alien identification card number, or number and country of issuance of any other government-issued document evidencing nationality or residence and bearing a photograph or other similar safeguard.

ii- Proof of Residence 

A Recent proof of home address in the person’s name (Bank Statement, Utility Bills, Phone Bills, ..) which should include Client’s Full Name, Client’s Home Address, and Date of Issuance (must not be more than 6 months old). 

b- Legal Persons 

A different identification procedure is followed for Legal Persons (corporate clients) interested in opening an account with the Company. These documentation requirements are presented below: 

i- Incorporation Documents 

The form and name of corporate documents may vary depending on country of incorporation and/or legal form of the company. However the required government-issued Corporate Documents should include Corporation name, Date and Place of Incorporation, Registered Office Address, Directors and authorised signatories, Ownership/shareholding structure (Shareholders names and shareholding percentage), Corporate registered activities. 

These documents may include but not limited to, Certificate of incorporation or Certificate of Registration, Certificate of Registered Office, Certificate of Directors and Secretary, Certificate of Registered Shareholders, Memorandum and articles of association,
ii- Directors and Beneficial Owners Documents
Personal KYC and identification documents are required from:
• - Legal Person’s Directors
• - Legal Person’s Ultimate Beneficial Owners with 10% beneficial ownership or more.
These identification documents include Proof of Identity and Proof of Residence.
iii- Board Resolution
A resolution of the board of directors of the legal person for the opening of the account and granting authority to those who will operate it.
5.2.3 Customers Who Refuse to Provide Information
If a prospective or existing customer either refuses to provide the information described above when prompted or appears to have intentionally provided misleading information, Unlimited Cloud LLC will not open a new account and, after considering the risks involved, consider closing any existing account. In either case, our Compliance Officer will be notified so that we might consider notifying Sila and our banking partner(s).
4.2.4 Verifying Information
Based on the risk, and to the extent reasonable and practicable, we will form a reasonable belief that we know the true identity of our customers by using risk-based procedures to verify and document the accuracy of the information provided. Unlimited will analyze the information we obtain to determine whether the information is sufficient to form a reasonable belief as to the true identity of the customer (e.g., whether the information is logical or contains inconsistencies).
We will verify customer identity through documentary means, non-documentary means, or both. We will use documents to verify customer identity when appropriate documents are available. In light of the increased instances of identity fraud, we will supplement the use of documentary evidence by using the non-documentary means described below whenever necessary. We may also use non-documentary means if we are still uncertain about whether we know the true identity of the customer.
To verify the identity of our customers by documentary means, we may request:
(1) for an individual, an unexpired government-issued identification evidencing nationality or residence and bearing a photograph or similar safeguard, such as a driver’s license or passport; or
(2) for a business entity or organization, documents evidencing its legal existence, such as certified articles of incorporation, a government-issued business license, a partnership agreement, or a trust instrument.

While we may rely on a government-issued ID as verification of a customer’s identity, we will consider any clear evidence of fraud in determining whether we can form a reasonable belief as to the customer’s true identity.
We will use non-documentary methods of verification if: the customer is unable to present an unexpired government-issued identification document with a photograph or other similar safeguard; we are unfamiliar with the documents presented by the customer; we do not have face-to-face contact with the customer; or other circumstances indicate potential increased risks that we will be unable to verify the customer’s true identify through documentary means.
To verify the identity of our customers by non-documentary means, we may:
(1) independently verify the customer’s identity by comparing the information with information obtained from a consumer reporting agency, public database, or other source [identify reporting agency, database, etc.];
(2) check references with other financial institutions; or
(3) obtain a financial statement.

We will verify the information within a reasonable time before or after the account is opened. Depending on the nature of the account and requested transactions, we may refuse to complete a transaction before we have verified the information, or in some instances when we need more time, we may, pending verification, restrict the types of transactions or dollar amount of transactions. If we find suspicious information that indicates possible money laundering, terrorist financing activity, or other suspicious activity, we will, after internal consultation with our Compliance Officer, notify Sila and our banking partner.
We will also identify customers that pose a heightened risk of not being properly identified. We will take the additional measures that may be used to obtain information about the identity of the individuals associated with the customer when standard documentary methods prove to be insufficient.
4.2.5 Verification Failure
When we cannot form a reasonable belief as to the true identity of a customer, we will: (1) not open an account; (2) impose terms under which a customer may conduct transactions while we attempt to verify the customer’s identity; (3) close an account after attempts to verify a customer’s identity fail; and (4) determine whether it is necessary to necessary to notify Sila and our banking partner.
5 Record Keeping Procedures
The Company should keep the below listed documents and information for use in any investigation into, or analysis, of possible money laundering or terrorist financing by national authorities.
The retention of the documents/data, other than the original documents or their certified true copies that are kept in a hard copy form, may be in other forms, such as electronic form, provided that the Company is able to retrieve the relevant documents/data without undue delay and present them at any time, to the relevant authorities, after a request. A true translation is attached in the case that the documents/data are in a language other than English.
a- The name and address of clients and copies or records of official identification documents (like passports, identity cards, or driving licenses).
b- The name and address (or identification code) of counterparties.
c- The form of instruction or authority.
d- The account details from which any funds were paid.
e- The form and destination of payment made by the business to the client.
f- Business correspondence.
g- For client due diligence, a copy of the references of the evidence is required, for a period of at least 5 years after the business relationship with the client has ended.
h- For business relationship and transactions, the supporting evidence and records for a period of at least five years following the carrying out of the transactions or the end of the business relationship.
We will document our verification, including all identifying information provided by a customer, the methods used and results of verification, and the resolution of any discrepancies identified in the verification process. We will keep records containing a description of any document that we relied on to verify a customer’s identity, noting the type of document, any identification number contained in the document, the place of issuance, and if any, the date of issuance and expiration date. With respect to non-documentary verification, we will retain documents that describe the methods and results of any measures we took to verify the identity of a customer. We will also keep records containing a description of the resolution of each substantive discrepancy discovered when verifying the identifying information obtained. We will retain records of all identification information for five years after the account has been closed; we will retain records made about verification of the customer's identity for five years after the record is made.
Our Compliance Officer and his or her designee is fully responsible for ensuring our BSA/AML records are maintained properly. As part of this BSA/AML Policy, we will create and maintain notifications of suspicious activities made to Sila and our banking partner, reports of currency received in a trade or business, [FBARs], and all relevant documentation on customer identity, verification, and funds transmittals. We will maintain suspicious activity notices and accompanying documentation for at least five years. We will keep other documents according to existing BSA regulations and other recordkeeping requirements.
5.4 Notice to Customer
We will provide notice to customers that the firm is requesting information from them to verify their identities, as required by federal law. We will use the following method to provide notice to customers: [describe notice you will provide for each possible method of account opening.]

Important Information About Procedures for Opening a New Account To help the government fight the funding of terrorism and money laundering activities, federal law requires all financial institutions to obtain, verify, and record information that identifies each person who opens an account.
What this means for you: When you open an account, we will ask for your name, address, date of birth and other information that will allow us to identify you. We may also ask to see your driver’s license or other identifying documents.


5.4- Suspicious Transactions and BSA Reporting
A suspicious transaction is a transaction which is inconsistent with a client's known, legitimate business or personal activities or with the normal business of the specific account, or in general with the economic profile that the Company has created for the client.
The Company ensures maintaining adequate information at all time and knows enough about its clients' activities in order to recognize on time that a transaction or a series of transactions is/are unusual or suspicious.
a. Notifying Financial Partners of Suspicious Transactions
To help usher compliance with our banking partner’s BSA obligations to file Suspicious Activity Reports (“SARs”) with FinCEN, we will notify Sila and our banking partner(s) of any transactions (including deposits and transfers) that a customer conducts or attempts on our platform involving $5,000 or more of funds or assets (either individually or in the aggregate) where we know, suspect, or have reason to suspect the transaction:
(1) involves funds derived from illegal activity or is intended or conducted in order to hide or disguise funds or assets derived from illegal activity as part of a plan to violate or evade federal law or regulation or to avoid any transaction reporting requirement under federal law or regulation;
(2) is designed, whether through structuring or otherwise, to evade any requirements of the BSA regulations;
(3) has no business or apparent lawful purpose or is not the sort in which the customer would normally be expected to engage, and after examining the background, possible purpose of the transaction and other facts, we know of no reasonable explanation for the transaction; or
(4) involves the use of our platform to facilitate criminal activity.

We will also notify Sila and our banking partner(s) in situations involving violations that require immediate attention, such as terrorist financing or ongoing money laundering schemes. We will retain copies of any such notices we provide to Sila and our banking partner, along with any supporting documentation for five years from the notification date. We will not notify any person involved in the transaction that we have notified Sila and our banking partner(s) of the relevant transaction except as specifically permitted by BSA regulations.

b. Reports of Currency Received in a Trade or Business
If we have knowledge of a currency transaction or multiple currency transactions that, in aggregate, amount to more than $10,000 conducted by or on behalf of the same person during any one business day, the Compliance Officer is responsible for electronically filing a report with FinCEN on FinCEN/IRS Form 8300, pursuant to 31 C.F.R. § 1010.330.

c. Foreign Bank and Financial Accounts Reports
Our Compliance Officer is responsible for electronically filing a Foreign Bank and Financial Accounts Report (“FBAR”) with FinCEN on FinCEN Form TD-F 90-22.1 for each foreign financial account aggregately valued at $10,000 at any point in the previous calendar year if we have an ownership interest in—or signatory authority over—the account pursuant to 31 C.F.R. § 1010.350.


5.4.1- Examples of Suspicious Transactions
Examples of what might constitute suspicious transactions/activities related to money laundering and terrorist financing include but not limited to:
a- Transactions with no discernible purpose or are unnecessarily complex.
b- Use of foreign accounts of companies or group of companies with complicated ownership structure which is not justified based on the needs and economic profile of the customer.
c- The transactions or the size of the transactions requested by the customer do not comply with his usual practice and business activity.
d- Large volume of transactions and/or money deposited or credited into, an account when the nature of the customer’s business activities would not appear to justify such activity.
e- The business relationship involves only one transaction or it has a short duration.
f- There is no visible justification for a customer using the services of a particular Financial Organisation. g- There are frequent transactions in the same financial instrument without obvious reason and in conditions that appear unusual.
h- There are frequent small purchases of a particular financial instrument by a customer who settles in cash, and then the total number of the financial instrument is sold in one transaction with settlement in cash or with the proceeds being transferred, with the customer’s instructions, in an account other than his usual account.
i- Any transaction the nature, size or frequency appear to be unusual, e.g. cancellation of an order, particularly after the deposit of the consideration.
J- Transactions which are not in line with the conditions prevailing in the market, in relation, particularly, with the size of the order and the frequency.
k- The settlement of any transaction but mainly large transactions in cash and/or settlement of the transaction by a third person which is different than the customer which gave the order.
l- Instructions of payment to a third person that does not seem to be related with the instructor.
m- Transfer of funds to and from countries or geographical areas which do not apply or they apply inadequately FATF’s recommendations on money laundering and terrorist financing.
n- A customer is reluctant to provide complete information when establishes a business relationship about the nature and purpose of its business activities, anticipated account activity, prior relationships with Financial Organisations, names of its officers and directors, or information on its business location. 0- The customer usually provides minimum or misleading information that is difficult or expensive for the Company to verify.
p- A customer provides unusual or suspicious identification documents that cannot be readily verified.
q- A customer that makes frequent or large transactions and has no record of past or present employment experience.
r- A customer who has been introduced by a foreign Financial Organisation, or by a third person whose countries or geographical areas of origin do not apply or they apply inadequately FATF’s recommendations on money laundering and terrorist financing.
s- Shared address for individuals involved in cash transactions, particularly when the address is also a business location and/or does not seem to correspond to the stated occupation (e.g. student, unemployed, self-employed, etc).
t- The stated occupation of the customer is not commensurate with the level or size of the executed transactions.
u- Use of general nominee documents in a way that restricts the control exercised by the company’s board of directors.
5.4.2- Suspicious Transaction Reporting Procedure
The procedure to report a client’s suspicious transaction is as follows:
a- The reports of Company’s employees from different departments are evaluated by the AML Compliance Officer.
b- If it is considered necessary, the Compliance Officer shall notify the relevant Money Laundering Authorities.
c- After the submission of a suspicious report the customers’ accounts concerned as well as any other connected accounts are placed under the close monitoring of the Compliance Officer.
d- After submitting the suspicious report, the Company adheres to any instructions given by relevant Money Laundering Authorities and, in particular, as to whether or not to continue or suspend a particular transaction or to maintain the particular account active.
d- Transactions executed for the customer are compared and evaluated against the anticipated account’s turnover, the usual turnover of the activities/operations of the customer and the data and information kept for the customer’s economic profile.
e- Significant deviations are investigated and the findings are recorded in the respective customer’s file.
f- Transactions that are not justified by the available information on the customer, are thoroughly examined so as to determine whether suspicions over money laundering or terrorist financing arise for the purposes of submitting an internal report to the compliance officer and then by the latter to relevant Money Laundering Authorities.
g- All necessary measures and actions must be taken based on the investigation findings, including any internal reporting of suspicious transactions/activities to the compliance officer. 


5.5- AML Compliance Officer daily/monthly Procedures
Unlimited Cloud LLC has a designated Compliance Officer, who is fully responsible for maintaining a program with procedures and internal controls appropriate to give effect to this BSA/AML Policy. Compliance Officer has a working knowledge of the BSA, the Patriot Act, and their implementing regulations and is qualified by experience, knowledge, and training.
The Compliance Officer will be responsible for overseeing communication and training for employees and monitoring the firm’s compliance with all obligations, including those directly applicable to this firm under the BSA and indirectly applicable through our banking partner. The Compliance Officer will also ensure the firm keeps and maintains all necessary transaction records and timely file both: notices of potentially suspicious transactions with Sila and our banking partners; and reports of currency received in a trade or business [and, if applicable, Foreign Bank and Financial Accounts Reports (“FBARs”)] with the Financial Crimes Enforcement Network (FinCEN) when appropriate. The Compliance Officer is vested with full responsibility and authority to implement and enforce this BSA/AML Policy.
Unlimited Cloud LLC will provide Sila with the Compliance Officer’s contact information, including [his or her] name, title, mailing address, email address, and phone number. [Firm Name] will promptly notify Sila if there is any change to the Compliance Officer position, [his or her] contact information, or the BSA/AML Policy itself.
The procedure to be followed by the AML compliance officer on a daily/monthly basis is as follows:
i- Receiving a daily report from staff members about regarding any suspicion transactions
ii- Examine the reports submitted (if any)
iii- Proceed and inform the Senior Management and advice if any of the below actions to be taken:
• Stop the transaction, if this is in process.
• Inform the client for the reason of the transaction being cancelled.
• Collect the information of the transaction if this has already been executed.
• Report to the appropriate authorities of the transaction as this is required by Law. 


5.6 Giving AML Information to Financial Partners
We will respond to any demand made by our financial software provider Sila or our banking partner(s) pursuant to a FinCEN BSA § 314(a) request concerning accounts and transactions by immediately searching our records to determine whether we maintain or have maintained any account for, or have engaged in any transaction with, each individual, entity, or organization named in the demand. We will respond to any such demand within 3 business days unless otherwise specified by Sila or our banking partner(s). Demand should be made to the Compliance Officer at the contact information provided. Unless otherwise stated in the demand, we are required to search those documents outlined in FinCEN’s FAQs. [FinCEN’s FAQs relating to the section 314(a) process may be obtained on the Secure Information Sharing System (“SISS”), by calling the FinCEN resource center at 800-767-2825 or 703-905-3591, or by emailing FCR@fincen.gov.] If we find a match, the Compliance Officer will report the match and all relevant documents to Sila or our banking partner (whomever made the demand).
If our Compliance Officer searches our records and does not find a matching account or transaction, [he or she] will indicate as such in response to Sila’s or our banking partner’s demand. We will maintain documentation that we have performed the required search by [include details on how you will document searches here]. The Compliance Officer will review, maintain, and implement procedures necessary to protect the security and confidentiality of demands for information made by Sila or our banking partner pursuant to a FinCEN BSA § 314(a) request similar to the procedures we use to protect our customers’ nonpublic information.
5.7.1 Checking OFAC Listings
Before a customer opens an account, and on an ongoing basis, the Compliance Officer will check to ensure the customer does not appear on the SDN list or is not engaging in transactions that are prohibited by the economic sanctions and embargoes administered and enforced by OFAC. [OFAC regularly updates the SDN list, which is available at https://www.treasury.gov/resource-center/sanctions/sdn-list/pages/default.aspx.] Since the SDN list and listings of economic sanctions and embargoes are updated frequently, we will consult them on a regular basis and subscribe to receive any available updates when they occur. With respect to the SDN list, we may also access that list through various software programs to ensure speed and accuracy. The Compliance Officer will also review existing accounts against the SDN list and listings of current sanctions and embargoes when they are updated and document the review.
If we determine that a customer is on the SDN list or is engaging in transactions that are prohibited by the economic sanctions and embargoes administered and enforced by OFAC, we will reject the transaction and, if necessary, block the customer's assets and file a blocked assets or rejected transaction form with OFAC within 10 days. We will also immediately call the OFAC Hotline at 800-540-6322.


6- Personnel Education and Training
The Company ensures that its employees are fully aware of their legal obligations according to the Law, in relation to the prevention of money laundering and terrorist financing by introducing a complete employee’s education and training program.
The training program aims at educating employees on the latest developments in the prevention of money laundering and terrorist financing, including the practical methods and trends used for this purpose.
The training program ensures that Company’s employees are fully aware that they can be personally liable for failure to report information or suspicion, regarding money laundering or terrorist financing. The timing and content of the training provided to the employees of the various departments is adjusted according to the needs of each department.
The frequency of the training can vary depending on to the amendments of legal and/or regulatory requirements, employees’ duties as well as any other changes in the financial system.
The training program has a different structure for new employees, existing employees and for different departments of the Company according to the services that they provide.
On-going training is given at regular intervals to ensure that the employees are reminded of their duties and responsibilities and kept informed of any new developments.
We will develop ongoing employee training under our Compliance Officer’s leadership and in consultation with senior management. Our training will occur on at least an annual basis. It will be based on our size, customer base, and resources and be updated as necessary to reflect any new developments in the law. Our training will include, at a minimum: (1) how to identify red flags and signs of money laundering that arise during the course of the employees’ duties; (2) what to do once the risk is identified (including how, when and to whom to escalate unusual customer activity or other red flags for analysis and, where appropriate, notifying Sila and our banking partner of suspicious activity); (3) what employees’ roles are in the firm's compliance efforts and how to perform them; (4) the firm's record retention policy; and (5) the disciplinary consequences (including civil and criminal penalties) for non-compliance with the BSA.
We will develop training in our firm, or contract for it. Delivery of the training may include educational pamphlets, videos, intranet systems, in-person lectures and explanatory memos. Currently our training program is: [insert specifics, such as “all registered representatives must view the video entitled “Spotting Money Laundering” by X date or within two weeks of being hired, etc.] We will maintain records to show the persons trained, the dates of training and the subject matter of their training. We will review our operations to see if certain employees, such as those in compliance, margin and corporate security, require specialized additional training. Our written procedures will be updated to reflect any such changes.

Any personal information collected about the client such as name, address, date of birth and contact details will be maintained with Unlimited Cloud LLC strictly for business purposes. Other information such as client transactions, copies of passports and proof of addresses will remain confidential and shared only between our account services and compliance departments. Unlimited Cloud LLC may additionally inquire about the credit worthiness of the client, which will also remain confidential within our customer files. Such information may be maintained either physically or electronically with strict access procedures.
Unlimited Cloud LLC may share client information with internal departments or affiliate offices who conduct marketing, back-office and customer service functions to accomplish normal business operations. However, client information is required to be kept confidential as each employee within the Unlimited Cloud LLC has signed a Confidentiality Agreement in this regard.
Any questions or additional information regarding our privacy policy may be directed to our Customer Service Department at support@unlimitedremit.com 


7 Evaluating BSA/AML Policy Programs and Procedures
Unlimited Cloud LLC has designated our Compliance Office to internally review and test our programs and procedures implemented under this BSA/AML Policy at least every two years. We may also identify a qualified third party to independently review and test our BSA/AML Policy programs and procedures if circumstances warrant. After we have completed internal review or independent testing, Compliance Officer will report the findings to senior management. We will promptly address each of the resulting recommendations and keep a record of how any noted deficiency was resolved.


8. Monitoring Employee Conduct and Accounts
We will subject employee accounts to the same AML procedures as customer accounts under the Compliance Officer’s supervision. We will also review the AML performance of supervisors as part of their annual performance review. The Compliance Officer’s own accounts will be reviewed by the CEO. 


9. Confidential Reporting of AML Non-Compliance
Employees will promptly report any potential violations of this BSA/AML Policy and the programs and procedures implemented thereunder to the Compliance Officer. If, however, the alleged violations implicate the Compliance Officer, the employee shall report to CEO. Such reports will be confidential, and the employee will suffer no retaliation for making them. 


10. Senior Manager Approval
Senior management has approved this BSA/AML Policy in writing as reasonably designed to achieve and monitor Unlimited Cloud’s ongoing compliance with BSA requirements and to satisfy our conditions of partnership with Sila and our banking partner. This approval is indicated by signatures below.


Signed:
Allen Bailochan Tuladhar
Title: Chief Executive Office

Date: November 5, 2021

We use cookies
Cookie preferences
Below you may find information about the purposes for which we and our partners use cookies and process data. You can exercise your preferences for processing, and/or see details on our partners' websites.
Analytical cookies Disable all
Functional cookies
Other cookies
We use cookies to personalize content and ads, to provide social media features and to analyze our traffic. Learn more about our cookie policy.
Change preferences Accept all
Cookies