{"id":2248,"date":"2020-01-02T00:00:08","date_gmt":"2020-01-02T00:00:08","guid":{"rendered":"http:\/\/sygna.io\/?p=2248"},"modified":"2023-03-16T03:40:03","modified_gmt":"2023-03-16T03:40:03","slug":"what-is-aml-kyc-in-crypto","status":"publish","type":"post","link":"https:\/\/www.sygna.io\/zh-hant\/blog\/what-is-aml-kyc-in-crypto\/","title":{"rendered":"What is AML\/KYC in Crypto?"},"content":{"rendered":"\n<h3 class=\"wp-block-heading\">Table of Contents<\/h3>\n\n\n\n<ol class=\"wp-block-list\"><li><a href=\"#1\">Introduction<\/a><\/li><li><a href=\"#2\">AML vs KYC: How are they different?<\/a><\/li><li><a href=\"#3\">What is Anti-Money Laundering?<\/a><\/li><li><a href=\"#4\">What is Know-Your-Customer (KYC)?<\/a><\/li><li><a href=\"#5\">Inside Know-Your-Customer<\/a><\/li><li><a href=\"#6\">Who Needs to Comply with KYC?<\/a><\/li><li><a href=\"#7\">Why is AML\/KYC important?<\/a><\/li><li><a href=\"#8\">Limitations of current KYC<\/a><\/li><li><a href=\"#9\">KYC in crypto in 2020<\/a><\/li><\/ol>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"1\">&nbsp;1. <strong>Introduction<\/strong><\/h2>\n\n\n\n<p>In the last few years, Know-Your-Customer (KYC) identity verification procedures have become vital to ensure that Anti-Money Laundering (AML) and Combating-Financing-of-Terrorism (CFT) efforts to curb cryptocurrencies-associated crimes are successful. <\/p>\n\n\n\n<p>While  AML regulators have targeted \u201ctraditional\u201d money laundering since the 1930\u2019s era of Prohibition crime bosses like Al Capone, current AML operations aim to ensure that technological innovations such as cryptocurrencies do not outpace the regulatory requirements that traditional financial assets are subjected to. Until now, the cryptocurrency industry has tried to boost AML efforts by employing KYC and Know-Your-Transaction (KYT) processes to verify the real parties behind digital identities and transaction origins. However, new regulations since 2018 by leading AML watchdogs such as the <a href=\"https:\/\/www.sygna.io\/en\/blog\/what-is-the-financial-action-task-force-fatf\/\" target=\"_blank\" rel=\"noreferrer noopener\">Financial Action Task Force (FATF)<\/a> and the U.S.\u2019 Financial Crimes Enforcement Network (FinCEN) shows that more is needed in 2020.<\/p>\n\n\n\n<p>This article takes a closer look at what is meant with AML\/KYC, how KYC fits in AML efforts, AML\/KYC&#8217;s history, who needs to adhere to it, current KYC limitations and how the crypto industry is impacted.<\/p>\n\n\n\n<div style=\"height:35px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" width=\"1030\" height=\"687\" src=\"https:\/\/www.sygna.io\/wp-content\/uploads\/2019\/12\/padlock-and-different-gadgets-on-the-wooden-PJR2ZPC-1030x687.jpg\" alt=\"lock and keyboard\" class=\"wp-image-2306\" srcset=\"https:\/\/www.sygna.io\/wp-content\/uploads\/2019\/12\/padlock-and-different-gadgets-on-the-wooden-PJR2ZPC-1030x687.jpg 1030w, https:\/\/www.sygna.io\/wp-content\/uploads\/2019\/12\/padlock-and-different-gadgets-on-the-wooden-PJR2ZPC-300x200.jpg 300w, https:\/\/www.sygna.io\/wp-content\/uploads\/2019\/12\/padlock-and-different-gadgets-on-the-wooden-PJR2ZPC-768x512.jpg 768w, https:\/\/www.sygna.io\/wp-content\/uploads\/2019\/12\/padlock-and-different-gadgets-on-the-wooden-PJR2ZPC-705x470.jpg 705w, https:\/\/www.sygna.io\/wp-content\/uploads\/2019\/12\/padlock-and-different-gadgets-on-the-wooden-PJR2ZPC-450x300.jpg 450w, https:\/\/www.sygna.io\/wp-content\/uploads\/2019\/12\/padlock-and-different-gadgets-on-the-wooden-PJR2ZPC.jpg 1500w\" sizes=\"(max-width: 1030px) 100vw, 1030px\" \/><\/figure><\/div>\n\n\n<div style=\"height:35px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">A Brief History of AML Regulations<\/h2>\n\n\n\n<p>Global AML regulation is heavily influenced by the policies that shape the United States\u2019 approach to money laundering. The cornerstones of the U.S\u2019 fight against money laundering are two legislative acts, the foundational Bank Secrecy Act (1970) and Title III of the Patriot Act (2001) that were created to respectively combat money laundering and terrorism funding.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.kroll.com\/en\/insights\/publications\/compliance-risk\/history-anti-money-laundering-united-states\" target=\"_blank\" rel=\"noreferrer noopener\">The BSA was a landmark law<\/a> that forced financial institutions to join the government in the fight against money laundering and created the foundation for a subsequent wave of AML regulations, most notably the Money Laundering Control Act (1986), Anti-Drug Abuse Act (1988). It is still at the forefront of AML legislation today and requires financial institutions to keep track of funds exceeding $10,0000 that flow in and out of the U.S.<\/p>\n\n\n\n<p>However, it wasn\u2019t until the release of the <a href=\"https:\/\/www.fincen.gov\/resources\/statutes-regulations\/usa-patriot-act\" target=\"_blank\" rel=\"noreferrer noopener\">Title III of the USA Patriot Act<\/a>, (also known as the International Money Laundering Abatement and Financial Anti-Terrorism Act of 2001) that the implementation of Know Your Customer (KYC), which forces financial institutions to comprehensively vet who they do business with, really took off.<\/p>\n\n\n\n<p>The Patriot Act aimed to eradicate the funding of terrorism through the financial sector. embedded KYC, also known as the Customer Identification Program (CIP) into the BSA as part of the U.S. AML policy.<\/p>\n\n\n\n<div style=\"height:35px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/www.sygna.io\/wp-content\/uploads\/2019\/12\/1024px-Great_Seal_of_the_United_States_obverse.svg_.png\" alt=\"FinCEN logo\" class=\"wp-image-2272\" width=\"512\" height=\"512\" srcset=\"https:\/\/www.sygna.io\/wp-content\/uploads\/2019\/12\/1024px-Great_Seal_of_the_United_States_obverse.svg_.png 1024w, https:\/\/www.sygna.io\/wp-content\/uploads\/2019\/12\/1024px-Great_Seal_of_the_United_States_obverse.svg_-300x300.png 300w, https:\/\/www.sygna.io\/wp-content\/uploads\/2019\/12\/1024px-Great_Seal_of_the_United_States_obverse.svg_-80x80.png 80w, https:\/\/www.sygna.io\/wp-content\/uploads\/2019\/12\/1024px-Great_Seal_of_the_United_States_obverse.svg_-768x768.png 768w, https:\/\/www.sygna.io\/wp-content\/uploads\/2019\/12\/1024px-Great_Seal_of_the_United_States_obverse.svg_-36x36.png 36w, https:\/\/www.sygna.io\/wp-content\/uploads\/2019\/12\/1024px-Great_Seal_of_the_United_States_obverse.svg_-180x180.png 180w, https:\/\/www.sygna.io\/wp-content\/uploads\/2019\/12\/1024px-Great_Seal_of_the_United_States_obverse.svg_-705x705.png 705w, https:\/\/www.sygna.io\/wp-content\/uploads\/2019\/12\/1024px-Great_Seal_of_the_United_States_obverse.svg_-120x120.png 120w, https:\/\/www.sygna.io\/wp-content\/uploads\/2019\/12\/1024px-Great_Seal_of_the_United_States_obverse.svg_-450x450.png 450w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/><figcaption>FinCEN logo source: <a href=\"https:\/\/en.wikipedia.org\/wiki\/Patriot_Act\">Wikipedia<\/a><\/figcaption><\/figure><\/div>\n\n\n<div style=\"height:35px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Due to the United States&#8217; influence as the world&#8217;s leading economic powerhouse, its KYC measures soon spread globally, leading to sweeping reforms in the world\u2019s most eminent financial jurisdictions.<\/p>\n\n\n\n<p>\u00a0In 2018, FinCEN\u2019s Customer Due Diligence Requirements for Financial Institutions <a href=\"https:\/\/www.govinfo.gov\/content\/pkg\/FR-2016-05-11\/pdf\/2016-10567.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">(CDD Rule (2018)<\/a> changed BSA regulations (which mandates the Patriot Act\u2019s KYC role) to make CDD clearer to understand, allowing financial institutions to adhere to 4 principles, namely identify and verify the identity of 1) customers and 2) beneficial owners, 3) develop risk profiles by investigating customer relationships, and 4) monitoring suspicious accounts with a risk-based approach on an ongoing basis to maintain customer records.<\/p>\n\n\n\n<div style=\"height:35px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"2\">2.<strong>AML vs KYC<\/strong>: How are they different?<\/h2>\n\n\n\n<div style=\"height:35px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" width=\"1030\" height=\"687\" src=\"https:\/\/www.sygna.io\/wp-content\/uploads\/2019\/12\/business-people-P6R6AW6-1030x687.jpg\" alt=\"\" class=\"wp-image-2276\" srcset=\"https:\/\/www.sygna.io\/wp-content\/uploads\/2019\/12\/business-people-P6R6AW6-1030x687.jpg 1030w, https:\/\/www.sygna.io\/wp-content\/uploads\/2019\/12\/business-people-P6R6AW6-300x200.jpg 300w, https:\/\/www.sygna.io\/wp-content\/uploads\/2019\/12\/business-people-P6R6AW6-768x512.jpg 768w, https:\/\/www.sygna.io\/wp-content\/uploads\/2019\/12\/business-people-P6R6AW6-1536x1025.jpg 1536w, https:\/\/www.sygna.io\/wp-content\/uploads\/2019\/12\/business-people-P6R6AW6-2048x1366.jpg 2048w, https:\/\/www.sygna.io\/wp-content\/uploads\/2019\/12\/business-people-P6R6AW6-1500x1001.jpg 1500w, https:\/\/www.sygna.io\/wp-content\/uploads\/2019\/12\/business-people-P6R6AW6-705x470.jpg 705w, https:\/\/www.sygna.io\/wp-content\/uploads\/2019\/12\/business-people-P6R6AW6-450x300.jpg 450w\" sizes=\"(max-width: 1030px) 100vw, 1030px\" \/><\/figure><\/div>\n\n\n<div style=\"height:35px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>The terms \u201cAML\u201d and \u201cKYC\u201d are often combined together or used interchangeably in finance, however, this is not totally accurate.&nbsp;<\/p>\n\n\n\n<p>Both are risk-based approaches to money laundering, but while AML and KYC software often work in tandem to whitelist customers, manage risk and monitor transactions, there is significant separation in the scope of their objectives.&nbsp;<\/p>\n\n\n\n<p>The confusion between what constitutes AML and KYC is a minefield for financial institutions, often resulting in fines and penalties. Companies have to ensure they incorporate a comprehensive AML program, not only KYC.\u00a0<br>Anti-Money Laundering (AML) is a complex framework of strategies, rules, and regulations to combat money laundering, while<a href=\"https:\/\/sumsub.com\/blog\/kyc-and-aml\/\" target=\"_blank\" rel=\"noreferrer noopener\"> Know-Your-Customer (KYC) is a process<\/a> that only identifies and authenticates the customers of financial institutions based on their perceived risk profile.\u00a0<\/p>\n\n\n\n<p>KYC is essentially a small cog in the big AML wheel, helping financial institutions verify the real identities of their customers. AML regulations require companies to submit risk reports, perform diligence processes before accepting new customers and report suspicious activities. Regulated entities that fail to comply with AML regulations face severe penalties and possible criminal prosecution.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Combating the Financing of Terrorism (CFT)<\/h3>\n\n\n\n<p>Combating the Financing of Terrorism (CFT) is a procedural set that investigates, analyzes and deters the funding of terrorism activities, helping authorities to bring terrorists to justice and isolate terror-promoting countries. CFT came to prominence after September 11 (2001) and is so closely intertwined with AML efforts, the G20 watchdog the Financial Action Task Force (FATF) refers to its policy as AML\/CFT, as covered by its<a href=\"http:\/\/www.sygna.io\/en\/blog\/what-is-the-financial-action-task-force-fatf\/\" target=\"_blank\" rel=\"noreferrer noopener\"> 40+9 Recommendations<\/a>.\u00a0<\/p>\n\n\n\n<div style=\"height:35px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"3\">3. What is Anti-Money Laundering (AML)?<\/h2>\n\n\n\n<div style=\"height:35px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Anti-Money Laundering (AML) is a comprehensive set of processes, regulations and rules that together cohesively combat money laundering, terrorism funding and other financial crimes such as identity fraud.<\/p>\n\n\n\n<p>AML aims to detect and disrupt money laundering activities, which normally happen in 3 stages: Placement, layering and integration.<\/p>\n\n\n\n<div style=\"height:35px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img decoding=\"async\" src=\"https:\/\/lh3.googleusercontent.com\/8yW3iyhDDD1NLN-n3iRlcSPdC9cpdL8-AJ_LGmdvz8IPLSTmh44pkRO4ZgaCQ0KK4sgWumcou-CaVxJozQ4OFk40rvrTB2dJbkd8nIBdypDm5Cps__hGsuaQTXUScK_noudS7ddd\" alt=\"A Typical Money Laundering Scheme \"\/><figcaption><a href=\"https:\/\/eumcc.eu\/money-laundering\/\" target=\"_blank\" rel=\"noreferrer noopener\">A Typical Money Laundering Scheme<\/a><\/figcaption><\/figure><\/div>\n\n\n<div style=\"height:35px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Led by AML watchdogs like the Financial Action Task Force (FATF), countries develop their own measures to combat domestic money laundering, and policies can differ greatly from country to country.&nbsp;<\/p>\n\n\n\n<p>A financial institution\u2019s AML policy should adhere to its domestic AML regulations and usually include<a href=\"https:\/\/complyadvantage.com\/knowledgebase\/kyc\/kyc-enhanced-due-diligence\/\" target=\"_blank\" rel=\"noreferrer noopener\"> these processes:<\/a><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>KYC procedure: Customer Due Diligence (CDD) and Enhanced Due Diligence (EDD)<\/li><li>Risk-based anti-money laundering policies<\/li><li>Ongoing risk assessment and monitoring<\/li><li>AML Compliance training for company staff<\/li><li>Internal Audits and Controls<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"4\">4. What is \u201cKnow Your Customer\u201d (KYC)?<\/h2>\n\n\n\n<p>\u201cKnow Your Customer\u201d (KYC) is a compliance process that financial institutions and certain companies employ to collect identity-establishing credentials from new customers who open accounts at their firms. It is a preventative measure that helps to clamp down on money laundering, terrorism funding and other criminal behavior like fraud. <\/p>\n\n\n\n<p>For example, in traditional finance, a new customer has to share his identification document (such as a passport) before opening a bank account, while in the cryptocurrency industry, users who want to register an account at a digital exchange need to upload their ID documents, which include a current picture of themselves and more.&nbsp;<\/p>\n\n\n\n<p>The KYC compliance process usually aims to establish a system for effective risk management,<a href=\"https:\/\/www.investopedia.com\/terms\/k\/knowyourclient.asp\" target=\"_blank\" rel=\"noreferrer noopener\"> transaction monitoring<\/a>, and customer acceptance policies, so that the company can be protected and ascertain the true origins of a new customer\u2019s funds.\u00a0There is no standardized KYC format that applies to all businesses. Instead, regulators largely leave it up to financial institutions to decide what information they collect.<\/p>\n\n\n\n<p>KYC can be divided into two standard risk-mitigation layers that are recognized and used around the world. These are Customer Due Diligence (CDD) and Enhanced Customer Due Diligence (EDD).&nbsp;Customer Due Diligence is a basic procedure to identify and profile new customers, while&nbsp;EDD is conducted on higher-risk customers through additional questioning and profiling.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Customer Due Diligence (CDD)<\/h3>\n\n\n\n<div style=\"height:35px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/www.sygna.io\/wp-content\/uploads\/2019\/12\/CDD.jpg\" alt=\"Customer Due Diligence, man drawing on a window\" class=\"wp-image-2267\" srcset=\"https:\/\/www.sygna.io\/wp-content\/uploads\/2019\/12\/CDD.jpg 1024w, https:\/\/www.sygna.io\/wp-content\/uploads\/2019\/12\/CDD-300x169.jpg 300w, https:\/\/www.sygna.io\/wp-content\/uploads\/2019\/12\/CDD-768x432.jpg 768w, https:\/\/www.sygna.io\/wp-content\/uploads\/2019\/12\/CDD-705x397.jpg 705w, https:\/\/www.sygna.io\/wp-content\/uploads\/2019\/12\/CDD-450x253.jpg 450w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption>Customer Due Diligence (Source:<a href=\"https:\/\/ivezic.com\/financial-crime\/understanding-kyc-cdd\/\" target=\"_blank\" rel=\"noreferrer noopener\">ivezic.com<\/a>)<\/figcaption><\/figure><\/div>\n\n\n<div style=\"height:35px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>KYC Customer Due Diligence (CDD) is a KYC process where a financial institution does a background check on a potential new customer prior to onboarding. CDD is done in order to understand the risk a new customer brings to your business, which may include illicit financial behavior, AML\/CFT transgressions or a poor credit history.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Enhanced Due Diligence (EDD)<\/h3>\n\n\n\n<p><a href=\"https:\/\/sumsub.com\/knowledgebase\/enhanced-due-diligence\/\" target=\"_blank\" rel=\"noreferrer noopener\">Enhanced Customer Due Diligence<\/a> (usually referred to as either EDD or ECDD) is, as its name suggests, a more sophisticated KYC process that conducts a deeper risk assessment when dealing with a potentially high-risk or high-net-worth new customer or partner. EDD focuses on areas of investigations that fall outside of the capabilities of the more basic CDD process. It is<a href=\"https:\/\/www.quora.com\/What-is-meant-by-CDD-EDD-as-part-of-the-KYC-AML\" target=\"_blank\" rel=\"noreferrer noopener\"> usually conducted manually<\/a> by skilled compliance officers and can be quite subjective by nature, based on the financial institution\u2019s risk tolerance.\u00a0<\/p>\n\n\n\n<p>EDD sprung into existence with the<a href=\"https:\/\/www.history.com\/topics\/21st-century\/patriot-act\" target=\"_blank\" rel=\"noreferrer noopener\"> USA PATRIOT Act of 2001,<\/a> where financial institutions such as offshore and private banks were suddenly required to conduct a better screening of their clients.\u00a0<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">What are the requirements for Enhanced Due Diligence?&nbsp;<\/h4>\n\n\n\n<p><a href=\"https:\/\/www.sec.gov\/about\/offices\/ocie\/aml2007\/fincen-factsheet1205.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Section 312 of the Patriot Act<\/a> requires that institutions:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>&nbsp;&#8220;shall establish appropriate, specific, and, where necessary, enhanced due diligence policies, procedures, and controls that are reasonably designed to detect and report instances of money laundering through those accounts.&#8221;<\/p><\/blockquote>\n\n\n\n<p><a href=\"https:\/\/www.dfsa.ae\/Documents\/Outreach%20Events\/DFSA%20Outreach%2022%20March%20AML.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">In a 2006 article<\/a> in <em><a href=\"https:\/\/www.acams.org\/en\" target=\"_blank\" rel=\"noreferrer noopener\">ACAMS<\/a> Today<\/em> (<a href=\"https:\/\/en.wikipedia.org\/wiki\/Association_of_Certified_Anti-Money_Laundering_Specialists\" target=\"_blank\" rel=\"noreferrer noopener\">Association of Certified Anti-Money Laundering Specialists<\/a>), AML specialist Peter Warrack suggested that in order to mitigate various risks and establish regulatory compliance, EDD procedures should:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>be consistent,&nbsp;<\/li><li>be \u201crigorous and robust\u201d ( documented in detail and immediately accessible to regulators)<\/li><li>achieve \u201creasonable assurance\u201d when assessing the customer\u2019s risk rating<\/li><li>identify adverse risk and information<\/li><li>gauge the customer\u2019s ability to launder money and fund terrorism.&nbsp;<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"5\">5. Inside Know-Your-Customer<\/h3>\n\n\n\n<h4 class=\"wp-block-heading\">What are the objectives of KYC?<\/h4>\n\n\n\n<p>The KYC process helps financial institutions (FIs) like banks and cryptocurrency exchanges mitigate the risk of being intentionally or unintentionally exploited by bad actors in order to conduct illicit financial behavior, launder money or fund terrorism. It also fosters a better understanding between the FI and its customers, helping to manage expectations and determine the best investment options available.&nbsp;<\/p>\n\n\n\n<p>When conducting a KYC assessment before doing business with a new customer, a financial institution (FI) needs to look at two elements, namely<a href=\"https:\/\/www.quora.com\/What-is-a-difference-between-KYC-and-AML\" target=\"_blank\" rel=\"noreferrer noopener\"> facts and behaviors<\/a>:<\/p>\n\n\n\n<p><strong>Facts: <\/strong>FI\u2019s try to establish what they know about the customer and the information that was provided. Is it accurate, and can it be used to create expected behavior parameters when compared with their whole customer base?<\/p>\n\n\n\n<p><strong>Behaviors: <\/strong>Once KYC facts have been verified to be accurate, FI\u2019s can next start to focus on the customer\u2019s behavior, to see if their transactions adhere to the law and remain in line with the previously established facts. If their behavior is not as expected, then either the \u201cfacts\u201d have been erroneously reported or there are suspicious activities happening that should be further investigated and likely reported to authorities.&nbsp;<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">How is a KYC policy created?&nbsp;<\/h4>\n\n\n\n<p>Companies that implement KYC usually build their policy around 4 core pillars:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Customer Acceptance Policy<\/li><li>Customer Identification Procedures<\/li><li>Monitoring of Transactions<\/li><li>Risk Management<\/li><\/ul>\n\n\n\n<p>Based on these pillars, a KYC investigation normally involves the following parts:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Collecting and studying personally identifiable information (PII), known in the U.S. as a CIP (Customer Identification Program).&nbsp;<\/li><li>Screening of the PII (which usually includes the real name, address, birth date and more of the customer) against worldwide AML\/CFT or Politically Exposed Person (PEP) lists and adverse public information (such as media reports).<\/li><li>Determining the risk a customer poses in terms of money laundering, terrorism funding, and other illicit behavior.&nbsp;<\/li><li>Creating and assessing a client profile based on their financial history<\/li><li>Monitoring a customer\u2019s transacting against expected behavior standards, based on the profiles of the customer and their peers.&nbsp;<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"6\">6. Who Needs to Comply with KYC?<\/h3>\n\n\n\n<p>In order to verify the identity of a new potential customer, financial institutions like banks need to check (and periodically review) a user\u2019s identifying documents. Let\u2019s take a look at what is required from different parties.&nbsp;<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">KYC and Customers<\/h4>\n\n\n\n<p>First off, new customers will need to submit requested documents,<a href=\"https:\/\/www.binance.vision\/glossary\/know-your-customer\" target=\"_blank\" rel=\"noreferrer noopener\"> which may include:<\/a>\u00a0<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Identity documents<\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>Photo ID document issued by government<\/li><li>Driver\u2019s Licence<\/li><li>Passport<\/li><li>Voter identification card<\/li><li>Social security Number<\/li><li>Permanent Account Number (PAN) card<\/li><\/ul>\n\n\n\n<h4 class=\"wp-block-heading\">Proof of Address<\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>Utility bill<\/li><li>Recent bank statement<\/li><li>Rental agreement<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">KYC and Traditional Banking<\/h3>\n\n\n\n<p>In addition to these basic KYC measures, banks need to also undertake periodic record updates, assign a risk level to each customer and monitor their transactions.&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/www.forbes.com\/sites\/forbestechcouncil\/2018\/10\/11\/kyc-and-aml-what-all-banks-need-to-know\/#68df80da70fc\" target=\"_blank\" rel=\"noreferrer noopener\">According to Forbes<\/a>, banks should collect KYC data from account holders or entities with which it has a business relationship, beneficiaries that use professional intermediaries like stockbrokers and chartered accountants as well as any associated person or entity that poses a risk to the bank.<\/p>\n\n\n\n<p>Banks should at a minimum employ these KYC and AML Best Practice tips to ensure due diligence and protect the security of their operations:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Randomly request and collect multiple identification sources from high-value clients during the first onboarding procedure<\/li><li>Place a higher-risk score on users that are identified as politically exposed persons (PEP)<\/li><li>Undertake simple but random ID checks on customer accounts throughout their duration.<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">KYC and the Investment Industry (FINRA Rule 2090)<\/h3>\n\n\n\n<div style=\"height:35px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" width=\"740\" height=\"416\" src=\"https:\/\/www.sygna.io\/wp-content\/uploads\/2019\/12\/101927260-AP562489808709.jpg\" alt=\"Financial Industry Regulatory Authority (FINRA) \" class=\"wp-image-2282\" srcset=\"https:\/\/www.sygna.io\/wp-content\/uploads\/2019\/12\/101927260-AP562489808709.jpg 740w, https:\/\/www.sygna.io\/wp-content\/uploads\/2019\/12\/101927260-AP562489808709-300x169.jpg 300w, https:\/\/www.sygna.io\/wp-content\/uploads\/2019\/12\/101927260-AP562489808709-705x396.jpg 705w, https:\/\/www.sygna.io\/wp-content\/uploads\/2019\/12\/101927260-AP562489808709-450x253.jpg 450w\" sizes=\"(max-width: 740px) 100vw, 740px\" \/><figcaption>Financial Industry Regulatory Authority (FINRA) Logo (Source:<a href=\"https:\/\/www.cnbc.com\/2014\/08\/18\/finra-charges-wedbush-securities-with-violations.html\">cnbc.com<\/a>)<\/figcaption><\/figure><\/div>\n\n\n<div style=\"height:35px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>When it comes to the financial investment industry in the U.S. , it uses specific KYC measures that comply with the Financial Industry Regulatory Authority (FINRA)\u2019s KYC Rule 2090 (Know Your Customer) and Rule 2111 (Suitability). These rules are not just there to please regulators but also help financial institutions better understand the needs and limitations of their customers and treat them fairly.&nbsp;<\/p>\n\n\n\n<p>FINRA is a non-governmental Self-Regulatory Organization (SRO) that ensures financial institutions comply with the Bank Secrecy Act. FINRA is in turn regulated by the SEC.<\/p>\n\n\n\n<p>FINRA\u2019s KYC Rule 2090 determines that a broker should use \u201creasonable effort\u201d when dealing with customers. This extends to essential record-keeping and knowing who else can authorize transactions on the customer\u2019s behalf.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">KYC and the Crypto Industry<\/h3>\n\n\n\n<div style=\"height:35px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/www.sygna.io\/wp-content\/uploads\/2019\/12\/a-smartphone-using-face-id-recognition-system-PD55NRU-1030x687.jpg\" alt=\"\" class=\"wp-image-2286\"\/><\/figure><\/div>\n\n\n<div style=\"height:35px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>With the crypto industry only a decade old and still largely unregulated, it took a few years for KYC procedures to make its appearance.&nbsp;<br><\/p>\n\n\n\n<p>However, with FinCEN\u2019s recent definition of many crypto-related enterprises as \u201cmoney service businesses (MSBs), and<a href=\"https:\/\/www.natlawreview.com\/article\/cftc-fincen-and-sec-warn-crypto-aml-enforcement\" target=\"_blank\" rel=\"noreferrer noopener\"> the joint warning<\/a> it issued with the Commodity Futures Trading Commission (CFTC) and Securities and Exchange Commission SEC in November 2019, stating that crypto businesses need to comply with the Bank Secrecy Act (BSA) or face the consequences, it is clear now that exchanges will need to seriously ramp up their compliance efforts to escape punitive measures from authorities.<\/p>\n\n\n\n<p>FinCEN has also proposed the <a href=\"https:\/\/www.sygna.io\/blog\/fincen-unhosted-private-crypto-wallet-regulations\/\" target=\"_blank\" rel=\"noreferrer noopener\">regulation of private (self-hosted) wallets who deal with exchanges in 2021<\/a>, the so-called Private Wallet Rule, which will require stronger KYC to be applied. <\/p>\n\n\n\n<h4 class=\"wp-block-heading\">KYC in crypto: Usually after registration, not before<\/h4>\n\n\n\n<p>Probably the biggest difference between crypto exchanges and traditional financial institutions is that crypto exchanges usually apply KYC after, not before, a user is signed up.<\/p>\n\n\n\n<p>A leading blockchain analytics company<a href=\"https:\/\/www.coindesk.com\/a-third-of-crypto-exchanges-have-little-or-no-kyc-says-ciphertrace\" target=\"_blank\" rel=\"noreferrer noopener\"> recently reported<\/a> that a 3<sup>rd<\/sup> of the top 120 exchanges have weak KYC verification systems and that 2 out of 3 exchanges lack strong KYC programs. This is especially problematic when considering the new FATF Recommendation 16 requirement that virtual asset service providers (VASPs) like exchanges collect and share beneficiary and recipient transaction data with each other where transmittals over $1000 are made.\u00a0<\/p>\n\n\n\n<p>This is certain to make a majority of exchanges non-compliant with the FATF\u2019s \u201ccrypto Travel Rule\u201d and force these VASPs\u2019 countries to take strong action against them.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>What types of KYC processes are used by exchanges?<\/strong><\/h4>\n\n\n\n<p>Most crypto exchanges allow users to register an account without conducting a full KYC onboarding process. As exchanges control the amount of crypto that can be deposited and withdrawn from their custodial platforms, most exchanges use a tiered level-system where a user is forced to provide more information in order to add or withdraw a bigger amount of cryptocurrency.&nbsp;<\/p>\n\n\n\n<p>Often though, for users with small portfolios, no KYC is needed, much to the chagrin of regulators, who are aware that criminals can spread their assets over hundreds of individual accounts. While this situation was prevalent a few years back, recent regulations and punitive actions by authorities such as FinCEN vs BTC-e have forced most reputable exchanges to employ at least some type of KYC protocol.<\/p>\n\n\n\n<p><strong>Crypto exchanges&#8217; KYC efforts generally fall in one of 3 categories:<\/strong><\/p>\n\n\n\n<ol class=\"wp-block-list\"><li><strong>No KYC-<\/strong> an exchange allows a new user to open an account without any KYC check, but with very limited functionality (e.g. no withdrawals)<\/li><li><strong>Basic KYC-<\/strong> an uploaded ID document and photo, with a fixed small deposit and withdrawal limit<\/li><li><strong>Full KYC <\/strong>\u2013 Users who want to deposit, withdraw and transmit large sums of crypto need to complete a more comprehensive KYC verification.<\/li><\/ol>\n\n\n\n<div style=\"height:35px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"7\">7. Why is KYC\/AML important?<\/h2>\n\n\n\n<div style=\"height:35px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>KYC\/AML enforcement and other regulatory requirements are beneficial to both financial institutions and their users. It allows financial businesses to mitigate risk, improve the security of their systems, protect their integrity and keep bad actors off their books, thus keeping regulators happy and at bay. This, in turn, fosters greater trust and reassurance with their customers.<\/p>\n\n\n\n<p>Used effectively, KYC can help financial institutions replace obsolete verification systems, perform a number of very beneficial services, such as screening and registering new users and ensure that high-profile transmittals are fully compliant.<br><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">KYC Leaks in Crypto<\/h3>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" width=\"640\" height=\"574\" src=\"https:\/\/www.sygna.io\/wp-content\/uploads\/2019\/12\/3uGGCvyenqJn4NpwUSzXdDRFxcaeHsJBeMbwhnG8kDGHZ8pcEwEm68tk5Fwb6eahk3N6DBcnGgd5SMMqJ1vtHvroD3uY4aFy1EaZTsKy81wgYe9AJUqDXKdsvbAFTDwEF5B48mBZJjMwmvAVRU9gHVkXFNrosd3aYpW1KvmnQ4Wp3WNe3s11UwuthDMCdK5tscGpii1XUKuA.png\" alt=\"KYC on a crypto exchange\" class=\"wp-image-2290\" srcset=\"https:\/\/www.sygna.io\/wp-content\/uploads\/2019\/12\/3uGGCvyenqJn4NpwUSzXdDRFxcaeHsJBeMbwhnG8kDGHZ8pcEwEm68tk5Fwb6eahk3N6DBcnGgd5SMMqJ1vtHvroD3uY4aFy1EaZTsKy81wgYe9AJUqDXKdsvbAFTDwEF5B48mBZJjMwmvAVRU9gHVkXFNrosd3aYpW1KvmnQ4Wp3WNe3s11UwuthDMCdK5tscGpii1XUKuA.png 640w, https:\/\/www.sygna.io\/wp-content\/uploads\/2019\/12\/3uGGCvyenqJn4NpwUSzXdDRFxcaeHsJBeMbwhnG8kDGHZ8pcEwEm68tk5Fwb6eahk3N6DBcnGgd5SMMqJ1vtHvroD3uY4aFy1EaZTsKy81wgYe9AJUqDXKdsvbAFTDwEF5B48mBZJjMwmvAVRU9gHVkXFNrosd3aYpW1KvmnQ4Wp3WNe3s11UwuthDMCdK5tscGpii1XUKuA-300x269.png 300w, https:\/\/www.sygna.io\/wp-content\/uploads\/2019\/12\/3uGGCvyenqJn4NpwUSzXdDRFxcaeHsJBeMbwhnG8kDGHZ8pcEwEm68tk5Fwb6eahk3N6DBcnGgd5SMMqJ1vtHvroD3uY4aFy1EaZTsKy81wgYe9AJUqDXKdsvbAFTDwEF5B48mBZJjMwmvAVRU9gHVkXFNrosd3aYpW1KvmnQ4Wp3WNe3s11UwuthDMCdK5tscGpii1XUKuA-450x404.png 450w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/><figcaption>KYC on a crypto exchange (Source:<a href=\"https:\/\/steemit.com\/cryptocurrency\/@nana2018\/poloniex-what-is-an-identity-id-verification-photo\" target=\"_blank\" rel=\"noreferrer noopener\">steemit.com<\/a>)<\/figcaption><\/figure><\/div>\n\n\n<p>In addition to exchange hacks, 2019 saw a number of prominent exchanges like Binance, BitMEX and<a href=\"https:\/\/news.bitcoin.com\/coinbase-severs-ties-with-hacking-team-members-while-data-sharing-backlash-intensifies\/\"> Coinbase<\/a> suffer KYC data scandals.\u00a0In August 2019, a hacker claimed to have intercepted the KYC details of<a href=\"https:\/\/www.coindesk.com\/binance-kyc-issue\" target=\"_blank\" rel=\"noreferrer noopener\"> 60,000 Binance users<\/a> after a hack in 2018.\u00a0Following<a href=\"https:\/\/cointelegraph.com\/news\/lawyer-asks-whether-kyc-is-worth-exposing-users-to-hacking-and-id-theft\" target=\"_blank\" rel=\"noreferrer noopener\"> a BitMEX mishap<\/a> where users\u2019 email addresses were exposed, an analyst questioned the wisdom of storing mass amounts of Personally Identifiable Information (PII) on centralized servers, in lieu of the security risks for phishing and identification fraud it exposes users to.\u00a0<\/p>\n\n\n\n<div style=\"height:35px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"8\"> <strong>8. <\/strong>Weaknesses of AML\/KYC<\/h2>\n\n\n\n<div style=\"height:35px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>While KYC implementation provides a worthy boost to global AML\/CFT efforts, regulators made it clear in 2019 that isn\u2019t enough. The reason for this is simple. While KYC, when done correctly, helps to put a name and face to a public blockchain address, its static nature and inconsistency as applied by individual VASPs, limits its scope.<\/p>\n\n\n\n<p>While its next evolutionary stage, <a href=\"http:\/\/www.sygna.io\/why-the-travel-rule-is-needed-in-addition-to-kyt-measures\" target=\"_blank\" rel=\"noreferrer noopener\">Know Your Transaction (KYT) <\/a>has successfully iterated AML in crypto further by investigating the origins of funds and suspicious transmittals and tying them to real identities, there is still a real need, at least for authorities, as encapsulated in the FATF\u2019s Recommendation 16 on Wire Transfers, that a standardized identification protocol is introduced to help facilitate compliant transmittals between all exchanges. This will help to discourage criminals from using VASPs and separate reputable exchanges from fly-by-night operations.<\/p>\n\n\n\n<div style=\"height:35px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"9\"><strong>9.<\/strong> AML\/KYC and crypto in 2020<\/h3>\n\n\n\n<div style=\"height:35px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img decoding=\"async\" src=\"https:\/\/lh4.googleusercontent.com\/roZ8mHG1hY62i6J6h3phFDRqYFp9MPJzGtGUnct6ruVzTpvppU7_Qee6x2s0ktRNSlIKQ3vhOTWiRlNIrJ9VxaH2YKXcHwimx4VEeUn2bus_PMs7yeWj59tsrNqH7VslLjES1lnX\" alt=\"global blockchain graphic\"\/><figcaption>Source: <a href=\"https:\/\/jim-lils.squarespace.com\/beneficial-owners\" target=\"_blank\" rel=\"noreferrer noopener\">jim-lils.squarespace.com<\/a><\/figcaption><\/figure><\/div>\n\n\n<p>In order to remain relevant in 2020 and beyond, KYC processes are in need of a more automated and standard approach that relieves administrative pressure on exchanges as well as simplifies the procedure for users who demand a more user-friendly experience.<\/p>\n\n\n\n<p>Possible innovations that come to mind include a universal KYC system where VASPs can access external records to cross-reference new users for previous flags. Also, the ability to encrypt KYC and transmittal data, but share it with law enforcement when required in line with regulatory expectations, would help to preserve the integrity of data privacy efforts.<\/p>\n\n\n\n<p>While trade-offs will have to be made, an improved KYC regime will help lay a much stronger foundation on which to help build the future of compliant virtual assets.<\/p>\n\n\n\n<div style=\"height:35px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading\"><em>Written by Werner Vermaak<\/em><\/h4>\n\n\n\n<div style=\"height:35px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">About CoolBitX and Sygna Bridge<\/h3>\n\n\n\n<p>CoolBitX\u2019s Sygna Bridge is a first-to-market travel rule solution and alliance network that is live and being used by our VASP partners to share compliant originator and beneficiary transmittal information.<\/p>\n\n\n\n<div style=\"height:35px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/www.sygna.io\/wp-content\/uploads\/2020\/04\/sygna-bridge-gif-1024x439.gif\" alt=\"This image has an empty alt attribute; its file name is sygna-bridge-gif-1024x439.gif\"\/><\/figure>\n\n\n\n<div style=\"height:35px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Sygna Bridge completed a successful production test report (Big 4 audited) earlier this year, which\u00a0<a href=\"https:\/\/www.crowdfundinsider.com\/2020\/05\/161211-regtech-blockchain-security-firm-coolbitx-presents-findings-of-sygna-bridges-production-report-to-fatf-contact-group\/\" target=\"_blank\" rel=\"noreferrer noopener\">was presented<\/a>\u00a0to the FATF Contact Group in May 2020. Sygna Bridge now also supports the\u00a0<a href=\"https:\/\/www.sygna.io\/blog\/joint-working-group-adopts-ivms101-crypto-messaging-standard-for-fatf-travel-rule\/\" target=\"_blank\" rel=\"noreferrer noopener\">IVMS101 messaging standard.<\/a><\/p>\n\n\n\n<p>CoolBitX has signed MoUs with 18 VASPs worldwide and recently\u00a0<a href=\"https:\/\/www.coindesk.com\/coolbitx-and-elliptic-team-up-to-offer-crypto-firms-compliance-tools\" target=\"_blank\" rel=\"noreferrer noopener\">joined forces with Elliptic<\/a>\u00a0in a combined quest to help crypto companies comply with the FATF Standards.<\/p>\n\n\n\n<p>For enquiries on the FATF Travel Rule and our Sygna Bridge solution for VASPs, please contact us at\u00a0<a href=\"mailto:info@sygna.io\" target=\"_blank\" rel=\"noreferrer noopener\">info@sygna.io<\/a>.<\/p>\n\n\n\n<p><strong>Disclaimer:<\/strong><em>&nbsp;CoolBitX provides these blog posts for general educational purposes only. Information on this blog does not constitute professional legal or financial advice and should not be considered as such. The author or company may update the information on this article at any time without prior notice and do not guarantee the work to be up to date and accurate. To the best of our knowledge the information provided here is factual at the time of writing.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>What is AML\/KYC in crypto? This guide looks at AML\/KYC&#8217;s history, impact, processes, current limitations and the parties who must adhere to it. <\/p>\n","protected":false},"author":7,"featured_media":3475,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[21,29,30,37],"tags":[],"class_list":["post-2248","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-crypto-compliance","category-know-your-customer-kyc","category-aml-kyc","category-blog-posts"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What is AML\/KYC in Crypto? - Sygna<\/title>\n<meta name=\"description\" content=\"What is AML\/KYC in crypto? This guide looks at AML\/KYC&#039;s history, impact, processes, current limitations and the parties who must adhere to it.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.sygna.io\/blog\/what-is-aml-kyc-in-crypto\/\" \/>\n<meta property=\"og:locale\" content=\"zh_TW\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is AML\/KYC in Crypto? - Sygna\" \/>\n<meta property=\"og:description\" content=\"What is AML\/KYC in crypto? This guide looks at AML\/KYC&#039;s history, impact, processes, current limitations and the parties who must adhere to it.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.sygna.io\/blog\/what-is-aml-kyc-in-crypto\/\" \/>\n<meta property=\"og:site_name\" content=\"Sygna\" \/>\n<meta property=\"article:published_time\" content=\"2020-01-02T00:00:08+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-16T03:40:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.sygna.io\/wp-content\/uploads\/2019\/12\/01_fb.png\" \/>\n\t<meta property=\"og:image:width\" content=\"941\" \/>\n\t<meta property=\"og:image:height\" content=\"789\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Vern\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.sygna.io\/wp-content\/uploads\/2019\/12\/01_twitter-.png\" \/>\n<meta name=\"twitter:label1\" content=\"\u4f5c\u8005:\" \/>\n\t<meta name=\"twitter:data1\" content=\"Vern\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u9810\u4f30\u95b1\u8b80\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"17 \u5206\u9418\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.sygna.io\/blog\/what-is-aml-kyc-in-crypto\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.sygna.io\/blog\/what-is-aml-kyc-in-crypto\/\"},\"author\":{\"name\":\"Vern\",\"@id\":\"https:\/\/www.sygna.io\/#\/schema\/person\/ddf70f3e6750e7efb538379e90f48737\"},\"headline\":\"What is AML\/KYC in Crypto?\",\"datePublished\":\"2020-01-02T00:00:08+00:00\",\"dateModified\":\"2023-03-16T03:40:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.sygna.io\/blog\/what-is-aml-kyc-in-crypto\/\"},\"wordCount\":3322,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.sygna.io\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.sygna.io\/blog\/what-is-aml-kyc-in-crypto\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.sygna.io\/wp-content\/uploads\/2020\/01\/a-smartphone-using-face-id-recognition-system-PD55NRU-scaled-1.jpg\",\"articleSection\":[\"Crypto Compliance\",\"Know-Your-Customer (KYC)\",\"AML\/KYC\",\"Blog\"],\"inLanguage\":\"zh-TW\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.sygna.io\/blog\/what-is-aml-kyc-in-crypto\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.sygna.io\/blog\/what-is-aml-kyc-in-crypto\/\",\"url\":\"https:\/\/www.sygna.io\/blog\/what-is-aml-kyc-in-crypto\/\",\"name\":\"What is AML\/KYC in Crypto? - Sygna\",\"isPartOf\":{\"@id\":\"https:\/\/www.sygna.io\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.sygna.io\/blog\/what-is-aml-kyc-in-crypto\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.sygna.io\/blog\/what-is-aml-kyc-in-crypto\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.sygna.io\/wp-content\/uploads\/2020\/01\/a-smartphone-using-face-id-recognition-system-PD55NRU-scaled-1.jpg\",\"datePublished\":\"2020-01-02T00:00:08+00:00\",\"dateModified\":\"2023-03-16T03:40:03+00:00\",\"description\":\"What is AML\/KYC in crypto? This guide looks at AML\/KYC's history, impact, processes, current limitations and the parties who must adhere to it.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.sygna.io\/blog\/what-is-aml-kyc-in-crypto\/#breadcrumb\"},\"inLanguage\":\"zh-TW\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.sygna.io\/blog\/what-is-aml-kyc-in-crypto\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-TW\",\"@id\":\"https:\/\/www.sygna.io\/blog\/what-is-aml-kyc-in-crypto\/#primaryimage\",\"url\":\"https:\/\/www.sygna.io\/wp-content\/uploads\/2020\/01\/a-smartphone-using-face-id-recognition-system-PD55NRU-scaled-1.jpg\",\"contentUrl\":\"https:\/\/www.sygna.io\/wp-content\/uploads\/2020\/01\/a-smartphone-using-face-id-recognition-system-PD55NRU-scaled-1.jpg\",\"width\":2560,\"height\":1707},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.sygna.io\/blog\/what-is-aml-kyc-in-crypto\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.sygna.io\/zh-hant\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\/\/www.sygna.io\/zh-hant\/blog\/category\/blog-posts\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Crypto Compliance\",\"item\":\"https:\/\/www.sygna.io\/zh-hant\/blog\/category\/blog-posts\/crypto-compliance\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"What is AML\/KYC in Crypto?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.sygna.io\/#website\",\"url\":\"https:\/\/www.sygna.io\/\",\"name\":\"Sygna\",\"description\":\"Who stores the transmittal information?\",\"publisher\":{\"@id\":\"https:\/\/www.sygna.io\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.sygna.io\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-TW\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.sygna.io\/#organization\",\"name\":\"Sygna\",\"url\":\"https:\/\/www.sygna.io\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-TW\",\"@id\":\"https:\/\/www.sygna.io\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.sygna.io\/wp-content\/uploads\/2019\/11\/Sygna_Logo_Postive_RGB.png\",\"contentUrl\":\"https:\/\/www.sygna.io\/wp-content\/uploads\/2019\/11\/Sygna_Logo_Postive_RGB.png\",\"width\":919,\"height\":221,\"caption\":\"Sygna\"},\"image\":{\"@id\":\"https:\/\/www.sygna.io\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.sygna.io\/#\/schema\/person\/ddf70f3e6750e7efb538379e90f48737\",\"name\":\"Vern\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-TW\",\"@id\":\"https:\/\/www.sygna.io\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/bf2d35ecced09f046d05c6c1002802327ee8b35ef7e549b4808851d28ad825a6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/bf2d35ecced09f046d05c6c1002802327ee8b35ef7e549b4808851d28ad825a6?s=96&d=mm&r=g\",\"caption\":\"Vern\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is AML\/KYC in Crypto? - Sygna","description":"What is AML\/KYC in crypto? This guide looks at AML\/KYC's history, impact, processes, current limitations and the parties who must adhere to it.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.sygna.io\/blog\/what-is-aml-kyc-in-crypto\/","og_locale":"zh_TW","og_type":"article","og_title":"What is AML\/KYC in Crypto? - Sygna","og_description":"What is AML\/KYC in crypto? This guide looks at AML\/KYC's history, impact, processes, current limitations and the parties who must adhere to it.","og_url":"https:\/\/www.sygna.io\/blog\/what-is-aml-kyc-in-crypto\/","og_site_name":"Sygna","article_published_time":"2020-01-02T00:00:08+00:00","article_modified_time":"2023-03-16T03:40:03+00:00","og_image":[{"width":941,"height":789,"url":"https:\/\/www.sygna.io\/wp-content\/uploads\/2019\/12\/01_fb.png","type":"image\/png"}],"author":"Vern","twitter_card":"summary_large_image","twitter_image":"https:\/\/www.sygna.io\/wp-content\/uploads\/2019\/12\/01_twitter-.png","twitter_misc":{"\u4f5c\u8005:":"Vern","\u9810\u4f30\u95b1\u8b80\u6642\u9593":"17 \u5206\u9418"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.sygna.io\/blog\/what-is-aml-kyc-in-crypto\/#article","isPartOf":{"@id":"https:\/\/www.sygna.io\/blog\/what-is-aml-kyc-in-crypto\/"},"author":{"name":"Vern","@id":"https:\/\/www.sygna.io\/#\/schema\/person\/ddf70f3e6750e7efb538379e90f48737"},"headline":"What is AML\/KYC in Crypto?","datePublished":"2020-01-02T00:00:08+00:00","dateModified":"2023-03-16T03:40:03+00:00","mainEntityOfPage":{"@id":"https:\/\/www.sygna.io\/blog\/what-is-aml-kyc-in-crypto\/"},"wordCount":3322,"commentCount":0,"publisher":{"@id":"https:\/\/www.sygna.io\/#organization"},"image":{"@id":"https:\/\/www.sygna.io\/blog\/what-is-aml-kyc-in-crypto\/#primaryimage"},"thumbnailUrl":"https:\/\/www.sygna.io\/wp-content\/uploads\/2020\/01\/a-smartphone-using-face-id-recognition-system-PD55NRU-scaled-1.jpg","articleSection":["Crypto Compliance","Know-Your-Customer (KYC)","AML\/KYC","Blog"],"inLanguage":"zh-TW","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.sygna.io\/blog\/what-is-aml-kyc-in-crypto\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.sygna.io\/blog\/what-is-aml-kyc-in-crypto\/","url":"https:\/\/www.sygna.io\/blog\/what-is-aml-kyc-in-crypto\/","name":"What is AML\/KYC in Crypto? - Sygna","isPartOf":{"@id":"https:\/\/www.sygna.io\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.sygna.io\/blog\/what-is-aml-kyc-in-crypto\/#primaryimage"},"image":{"@id":"https:\/\/www.sygna.io\/blog\/what-is-aml-kyc-in-crypto\/#primaryimage"},"thumbnailUrl":"https:\/\/www.sygna.io\/wp-content\/uploads\/2020\/01\/a-smartphone-using-face-id-recognition-system-PD55NRU-scaled-1.jpg","datePublished":"2020-01-02T00:00:08+00:00","dateModified":"2023-03-16T03:40:03+00:00","description":"What is AML\/KYC in crypto? This guide looks at AML\/KYC's history, impact, processes, current limitations and the parties who must adhere to it.","breadcrumb":{"@id":"https:\/\/www.sygna.io\/blog\/what-is-aml-kyc-in-crypto\/#breadcrumb"},"inLanguage":"zh-TW","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.sygna.io\/blog\/what-is-aml-kyc-in-crypto\/"]}]},{"@type":"ImageObject","inLanguage":"zh-TW","@id":"https:\/\/www.sygna.io\/blog\/what-is-aml-kyc-in-crypto\/#primaryimage","url":"https:\/\/www.sygna.io\/wp-content\/uploads\/2020\/01\/a-smartphone-using-face-id-recognition-system-PD55NRU-scaled-1.jpg","contentUrl":"https:\/\/www.sygna.io\/wp-content\/uploads\/2020\/01\/a-smartphone-using-face-id-recognition-system-PD55NRU-scaled-1.jpg","width":2560,"height":1707},{"@type":"BreadcrumbList","@id":"https:\/\/www.sygna.io\/blog\/what-is-aml-kyc-in-crypto\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.sygna.io\/zh-hant\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/www.sygna.io\/zh-hant\/blog\/category\/blog-posts\/"},{"@type":"ListItem","position":3,"name":"Crypto Compliance","item":"https:\/\/www.sygna.io\/zh-hant\/blog\/category\/blog-posts\/crypto-compliance\/"},{"@type":"ListItem","position":4,"name":"What is AML\/KYC in Crypto?"}]},{"@type":"WebSite","@id":"https:\/\/www.sygna.io\/#website","url":"https:\/\/www.sygna.io\/","name":"Sygna","description":"Who stores the transmittal information?","publisher":{"@id":"https:\/\/www.sygna.io\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.sygna.io\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-TW"},{"@type":"Organization","@id":"https:\/\/www.sygna.io\/#organization","name":"Sygna","url":"https:\/\/www.sygna.io\/","logo":{"@type":"ImageObject","inLanguage":"zh-TW","@id":"https:\/\/www.sygna.io\/#\/schema\/logo\/image\/","url":"https:\/\/www.sygna.io\/wp-content\/uploads\/2019\/11\/Sygna_Logo_Postive_RGB.png","contentUrl":"https:\/\/www.sygna.io\/wp-content\/uploads\/2019\/11\/Sygna_Logo_Postive_RGB.png","width":919,"height":221,"caption":"Sygna"},"image":{"@id":"https:\/\/www.sygna.io\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.sygna.io\/#\/schema\/person\/ddf70f3e6750e7efb538379e90f48737","name":"Vern","image":{"@type":"ImageObject","inLanguage":"zh-TW","@id":"https:\/\/www.sygna.io\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/bf2d35ecced09f046d05c6c1002802327ee8b35ef7e549b4808851d28ad825a6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/bf2d35ecced09f046d05c6c1002802327ee8b35ef7e549b4808851d28ad825a6?s=96&d=mm&r=g","caption":"Vern"}}]}},"_links":{"self":[{"href":"https:\/\/www.sygna.io\/zh-hant\/wp-json\/wp\/v2\/posts\/2248","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sygna.io\/zh-hant\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.sygna.io\/zh-hant\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.sygna.io\/zh-hant\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.sygna.io\/zh-hant\/wp-json\/wp\/v2\/comments?post=2248"}],"version-history":[{"count":23,"href":"https:\/\/www.sygna.io\/zh-hant\/wp-json\/wp\/v2\/posts\/2248\/revisions"}],"predecessor-version":[{"id":7723,"href":"https:\/\/www.sygna.io\/zh-hant\/wp-json\/wp\/v2\/posts\/2248\/revisions\/7723"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.sygna.io\/zh-hant\/wp-json\/wp\/v2\/media\/3475"}],"wp:attachment":[{"href":"https:\/\/www.sygna.io\/zh-hant\/wp-json\/wp\/v2\/media?parent=2248"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.sygna.io\/zh-hant\/wp-json\/wp\/v2\/categories?post=2248"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.sygna.io\/zh-hant\/wp-json\/wp\/v2\/tags?post=2248"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}