This KYC policy outlines the procedures and responsibilities for verifying the identity of our customers, understanding their activities, and managing risks related to money laundering, fraud, and other illegal activities. Compliance with this policy ensures that Ai Geeks Limited
adheres to legal and regulatory standards.
The personal information that you are asked to provide, and the reasons why you are asked to provide it, will be made clear to you at the point we ask you to provide your personal information. If you contact us directly, we may receive additional information about you such as your name, email address, phone number, the contents of the message and/or attachments you may send us, and any other information you may choose to provide. When you register for an Account, we may ask for your contact information, including items such as name, company name, address, email address, and telephone number.
Individual Customers:
Full name
Date of birth
Residential address
Government-issued identification number (e.g., passport, national ID, driver’s license)
Full GlobalPass screening report
Corporate Customers:
Company name
Registered address
Registration number
Names of directors and beneficial owners
Identification documents for key individuals
Signed service agreement
We verify the authenticity of identification documents through official databases or third-party services using GlobalPass.
Conduct face-to-face or video call verification if necessary.
For corporate customers, verify registration details and ownership structures through official
registries.
Classify customers into risk categories (low, medium, high) based on their profiles, business
nature, and transaction patterns. High-risk customers may include those from high-risk jurisdictions, politically exposed persons (PEPs), and those with complex ownership structures.
Apply additional scrutiny for high-risk customers, including detailed verification of identity and source of funds.
Regularly update information and monitor transactions closely.
Continuously monitor transactions to detect suspicious activities. Use automated systems to flag unusual transactions for further review.
Maintain records of all transactions and verification steps for at least [3] years.
Report suspicious transactions to the relevant authorities in accordance with local regulations. Insure secure storage and accessibility of customer identification and transaction records for audit purposes.