Skip to content
  • Home
  • About us
  • Contact us

Celtouch LLC, All Rights Reserved

Mobile Value added services

  • Home
  • About us
  • Contact us
  • ⤫

AML Policy

Version 2_0, 04 August 2025

INDEX

CELTOUCH ANTI–MONEY LAUNDERING AND COUNTER–TERRORIST FINANCING POLICY (U.S. Edition)

1. Purpose & Objective

3. Scope of Application

4.Définitions

5. Legal & Regulatory Framework

6. Governance & Compliance Structure

7. Risk-Based Approach (RBA)

8. Customer Due Diligence (CDD) & Know Your Customer (KYC)

9. Recordkeeping & Retention

10. Sanctions Screening

11. Transaction Monitoring

12. Suspicious Activity Detection & Reporting

13. Prohibited & Restricted Activities

14. Staff Screening, Training & Awareness

15. Technology Systems & Data Security

16. Cooperation with Regulators & Law-Enforcement

17. Independent Audit & Continuous Improvement

18. Enforcement & Disciplinary Measures

19. Policy Review & Governance

20. Documentation & Record Control

21. Enterprise-Wide Risk Classification Framework

22. Customer Identification (KYC) Requirements

23. Red-Flag Indicators of Suspicious Activity

24. Suspicious Activity Reporting Templates

25. Recordkeeping & Retention Standards

26. Partner & Correspondent Due Diligence

27. Training & Competence Matrix

28. Governance & Accountability

29. Policy Attestation

30. Appendix A – Reference Frameworks

31. Appendix B – Document Control

32. Appendix C – Compliance Contacts

33. Appendix D – Acronyms & Abbreviations (U.S. Version)

CELTOUCH ANTI–MONEY LAUNDERING AND COUNTER–TERRORIST FINANCING POLICY (U.S. Edition)

1. Purpose & Objective

This Anti–Money Laundering and Counter–Terrorist Financing Policy (“the Policy”) establishes the governance, controls, and responsibilities that Celtouch and its affiliated entities shall apply to detect, prevent, and report money laundering (“ML”), terrorist financing (“TF”), and related financial crimes in accordance with United States federal law.

The objectives of this Policy are to:

  • Ensure full compliance with applicable U.S. AML/CFT legislation and FinCEN regulations.
  • Protect Celtouch’s reputation and the integrity of the financial system by deterring the misuse of its services.
  • Implement a risk-based compliance framework consistent with the Bank Secrecy Act (BSA) and Anti-Money Laundering Act of 2020 (AMLA).
  • Define clear accountability across management and employees for AML/CFT governance.

This Policy applies to all Celtouch entities, subsidiaries, employees, contractors, and technology partners (including Coral Commerce) involved in onboarding, monitoring, and transaction processing.

2. Policy Statement

Celtouch is firmly committed to conducting its business with integrity, transparency, and in full compliance with U.S. laws and regulations governing anti-money laundering and counter-terrorist financing.

Celtouch’s compliance framework aligns with:

  • Bank Secrecy Act (31 U.S.C. § 5311 et seq.)
  • Anti-Money Laundering Act of 2020 (AMLA)
  • Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001 (Patriot Act)
  • OFAC Sanctions Programs and the Specially Designated Nationals (SDN) List
  • Financial Action Task Force (FATF) 40 Recommendations
  • Wolfsberg Group Principles and Basel Committee AML Guidelines

Celtouch maintains a zero-tolerance policy toward any employee, customer, or partner involved in or facilitating financial crime.

3. Scope of Application

This Policy applies to:

  • All Celtouch business activities within the United States.
  • All financial products and services, including:
    • Escrow and blocked-fund holding services.
    • Guarantor and financial assurance programs.
    • Cross-border settlements and custodial transfers.
  • All delivery channels, including online, mobile, and agent-assisted.

4. Définitions

TermMeaning
Money Laundering (ML)Concealing or disguising the origins of illegally obtained money.
Terrorist Financing (TF)Collecting or providing funds for terrorist acts or organisations.
Customer Due Diligence (CDD)Identifying and verifying customers’ identities and business activities.
Enhanced Due Diligence (EDD)Additional scrutiny for high-risk clients or transactions.
Suspicious Activity Report (SAR)Report filed with FinCEN when suspicious behaviour is detected.
Politically Exposed Person (PEP)An individual with prominent public responsibilities, posing higher corruption risk.
Beneficial OwnerThe natural person who ultimately owns or controls an entity.

5. Legal & Regulatory Framework

Celtouch operates under the following U.S. legal and regulatory authorities:

  • Financial Crimes Enforcement Network (FinCEN) — U.S. Treasury bureau that administers AML laws and receives SARs.
  • Office of Foreign Assets Control (OFAC) — Enforces economic and trade sanctions.
  • Federal Deposit Insurance Corporation (FDIC) — Oversees compliance for institutions handling customer funds.
  • Federal Bureau of Investigation (FBI) — Investigates financial crimes.
  • Internal Revenue Service (IRS) — Oversees reporting of large or suspicious cash transactions.
  • U.S. Securities and Exchange Commission (SEC) — Regulates securities-related AML obligations.

6. Governance & Compliance Structure

6.1. Board of Directors

  • Holds ultimate accountability for AML/CFT compliance.
  • Approves the AML Policy and receives quarterly compliance reports.
  • Ensures the Compliance Officer has adequate authority and resources.

6.2. Designated Compliance Officer (DCO)

  • Senior official responsible for AML oversight.
  • Duties include:
    • Overseeing CDD/KYC processes.
    • Reviewing high-risk accounts.
    • Approving SAR filings.
    • Liaising with FinCEN and OFAC.
    • Reporting quarterly to the Board.

6.3. AML Compliance Department

  • Monitors compliance controls, transaction monitoring, and sanctions screening.
  • Conducts ongoing risk assessments and training.
  • Coordinates independent AML audits.

6.4. Independent Audit Function

  • Performs annual AML audits to evaluate effectiveness of controls.
  • Reports findings directly to the Board.

6.5. Compliance Committee

  • Includes representatives from Legal, Operations, and Finance.
  • Reviews escalated cases and updates risk assessments.

7. Risk-Based Approach (RBA)

Celtouch employs a Risk-Based Approach in line with FinCEN and FATF standards to identify, assess, and mitigate ML/TF risks.

7.1. Enterprise Risk Assessment

Conducted annually to evaluate:

  • Customer risk (individuals, corporates, PEPs).
  • Geographic exposure (high-risk countries).
  • Product/service risk (escrow, guarantor, cross-border).
  • Channel risk (digital vs. in-person onboarding).

7.2. Risk Classification

Risk LevelDefinitionControl Measure
LowTransparent clients, simple activityStandard CDD
MediumModerate risk exposurePeriodic review (24 months)
HighComplex structures, cross-borderEDD and senior approval

7.3. Enhanced Controls

  • Senior management review of all high-risk relationships.
  • Verification of source of wealth and funds.
  • Real-time transaction monitoring.
  • Annual re-verification.

8. Customer Due Diligence (CDD) & Know Your Customer (KYC)

8.1. Individuals

  • Verify full legal name, date of birth, address, and SSN or ITIN.
  • Obtain a government-issued photo ID (passport, driver’s license, or state ID).
  • Collect proof of address (utility bill, bank statement).
  • Verify source of funds and intended use.

8.2. Corporations

  • Obtain Certificate of Incorporation or formation.
  • Identify directors, officers, and beneficial owners (≥25%).
  • Validate Employer Identification Number (EIN).
  • Collect operating address, tax filings, and business description.
  • Obtain ownership chart and authorized signatory list.

8.3. Enhanced Due Diligence (EDD)

Required for:

  • PEPs and their associates.
  • Clients from high-risk jurisdictions (as identified by FATF/OFAC).
  • High-value or complex transactions.
Measures include:
    • Source of wealth verification.
    • Adverse media screening.
    • Senior-level approval.

8.4. Simplified Due Diligence (SDD) Allowed only for low-risk relationships, under FinCEN guidance, and never for escrow/guarantor accounts.

9. Recordkeeping & Retention

  • Maintain KYC and transaction data for at least five (5) years after account closure or transaction completion.
  • Records must allow reconstruction of each transaction.
  • Stored securely in encrypted systems with access logs.
  • Destruction of records before retention expiry is prohibited.

10. Sanctions Screening

All customers, transactions, and counterparties are screened against:

  • OFAC SDN List
  • U.S. State Department Sanctions Lists
  • UN Security Council Sanctions List
  • EU Consolidated Sanctions List (for global transactions)

Positive matches result in immediate account freeze, compliance review, and SAR filing.

11. Transaction Monitoring

Celtouch employs automated, rule-based and AI-assisted monitoring through Coral Commerce infrastructure.


The system flags anomalies including:

  • Unusual transaction frequency or volume.
  • Third-party fund transfers.
  • Activity inconsistent with client profile.
  • Rapid movement of funds between unrelated accounts.

Alerts are escalated to the Compliance Officer for investigation and potential SAR filing.

12. Suspicious Activity Detection & Reporting

12.1. Obligation to Report

Celtouch and its employees are required under the Bank Secrecy Act (BSA) and FinCEN regulations to identify and report any known or suspected instance of money laundering, terrorist financing, or other financial crime.


This duty extends to all staff, officers, and agents who become aware of suspicious conduct, whether before, during, or after a transaction.

12.2. Identifying Suspicious Activity

Examples of suspicious activity include:

  • Transactions inconsistent with the customer’s business or income level.
  • Large or rapid transfers between unrelated accounts or jurisdictions.
  • Attempts to avoid reporting thresholds (“structuring”).
  • Unexplained involvement of third parties in escrow deposits or withdrawals.
  • Client reluctance to provide identification or supporting documents.
  • Activity involving high-risk or sanctioned countries.
  • Use of multiple, sequential escrow accounts without clear purpose.

12.3. Internal Reporting Process

  • Front-line detection: Any employee noticing red-flag behaviour must complete an Internal Suspicious Transaction Report (ISTR).
  • Compliance review: The report is submitted to the Designated Compliance Officer (DCO) for evaluation and documentation.
  • Escalation: If suspicion is substantiated, the DCO prepares and files a Suspicious Activity Report (SAR) with FinCEN within 30 calendar days of initial detection (or 60 days if additional information is required).
  • Confidential record: All supporting data are retained securely for a minimum of five years.

12.4. Prohibition on Tipping Off

Employees are strictly prohibited from informing any customer or third party that a SAR has been or may be filed, or that their transactions are under review.


Any breach of confidentiality constitutes a violation of 31 U.S.C. § 5318(g)(2) and may result in criminal penalties and termination of employment.

12.5. Freezing and Rejection of Transactions

If activity appears connected to sanctions or criminal conduct:

  • The transaction is immediately frozen or rejected pending investigation.
  • The DCO documents the action and notifies OFAC and FinCEN as appropriate.
  • Funds remain restricted until formal clearance or government instruction.

13. Prohibited & Restricted Activities

Celtouch will not process or maintain relationships involving:

  • Anonymous or fictitious accounts.
  • Shell banks or unlicensed money-service businesses.
  • Individuals or entities on any OFAC or UN Sanctions List.
  • Cash deposits or withdrawals related to escrow or guarantor operations.
  • Virtual-currency mixers or unregistered exchanges.
  • Transactions designed to disguise true ownership or purpose.

Celtouch reserves the right to terminate any account that presents unacceptable AML/CFT risk.

14. Staff Screening, Training & Awareness

14.1. Employee Screening

All staff occupying compliance-sensitive positions must undergo pre-employment background checks and periodic re-screening.
Disqualifying factors include convictions for fraud, bribery, or financial crimes.

14.2. Mandatory AML/CFT Training

Celtouch provides annual training covering:

  • U.S. AML/CFT laws (BSA, AMLA, Patriot Act).
  • KYC/CDD requirements and document verification.
  • Recognition of red flags and escalation procedures.
  • SAR preparation and FinCEN e-filing process.
  • OFAC sanctions programs and blocking rules.
  • Data-protection and confidentiality obligations.

Additional modules are assigned when regulations change or system upgrades occur.

14.3. Assessment and Recordkeeping

Each employee must complete a short examination to confirm understanding.
Completion records are logged in the HR compliance database and retained for five years.


Non-completion or failed assessments trigger remedial training and possible disciplinary action.

15. Technology Systems & Data Security

15.1. System Integrity

All financial transactions and AML processes operate through secure, audited systems provided by Coral Commerce.


These systems ensure:

  • End-to-end encryption of data in transit and at rest.
  • Immutable audit trails for every transaction.
  • Access control limited to authorised personnel only.
  • Redundancy and backup for business-continuity assurance.

15.2. Automated AML Tools

Celtouch employs:

  • Sanctions-screening engines using the latest OFAC SDN, UN, and EU data.
  • Machine-learning analytics to detect structuring, layering, and unusual patterns.
  • Transaction-monitoring algorithms calibrated to risk thresholds.
  • Case-management workflows for alert triage, investigation, and resolution.

15.3. Data Protection

Celtouch complies with U.S. privacy and cybersecurity laws, including the Gramm–Leach–Bliley Act (GLBA) and relevant state data-protection statutes.


Data are stored in U.S. jurisdictions and may not be transferred abroad without approval from Compliance and Legal.

16. Cooperation with Regulators & Law-Enforcement

Celtouch cooperates fully with:

  • FinCEN for SAR filings and AML data requests.
  • OFAC for sanctions compliance and blocking orders.
  • FBI, IRS-Criminal Investigation, and other agencies investigating financial crimes.

All requests for records or information must be handled solely by the Compliance Officer to maintain consistency and confidentiality.


Celtouch will provide prompt, complete responses to lawful subpoenas and 314(a) requests under the Patriot Act.

17. Independent Audit & Continuous Improvement

17.1. Independent Audit

An independent internal or external auditor will:

  • Test AML/CFT systems and controls annually.
  • Validate transaction-monitoring accuracy and SAR timeliness.
  • Review employee training coverage and competence.
  • Report findings directly to the Board Audit Committee and Compliance Committee.

17.2. Continuous Improvement

Celtouch commits to continuous enhancement by:

  • Updating monitoring parameters based on new typologies.
  • Conducting semi-annual system calibrations and data-quality checks.
  • Integrating regulatory feedback and enforcement-trend analysis.
  • Implementing all audit recommendations within agreed deadlines.

18. Enforcement & Disciplinary Measures

  • Non-compliance with this Policy may result in disciplinary action up to and including termination.
  • Serious or wilful violations will be referred to authorities under 31 U.S.C. § 5322.
  • Managers are responsible for ensuring timely remediation of any identified deficiencies.
  • Systemic breaches trigger immediate review by the Board Compliance Committee.

19. Policy Review & Governance

  • The Compliance Officer will review this Policy annually, or sooner if required by legislative or operational change.
  • Revisions will be approved by the Board of Directors before implementation.
  • Updated versions will be distributed to all staff and maintained in the compliance portal with version control.

20. Documentation & Record Control

  • A master version of this Policy is stored securely by the Compliance Department.
  • Archived copies are retained for at least ten (10) years.
  • Employees must acknowledge receipt and understanding within five business days of issuance.
  • A summary of this Policy may be made publicly available for transparency.

21. Enterprise-Wide Risk Classification Framework

Celtouch’s risk assessment model follows a structured methodology consistent with FinCEN guidance and FATF’s Risk-Based Approach (RBA).


Each customer, product, and transaction is classified based on inherent and residual risk.

Risk CategoryDescriptionExamplesControls Applied
Customer RiskType, nature, and activity of the clientIndividual, Corporate, PEP, Trust, Non-ProfitCDD or EDD as appropriate
Geographic RiskCountry of residence or transaction destinationOFAC-sanctioned or FATF high-risk jurisdictionsScreening and enhanced review
Product/Service RiskNature of financial productEscrow, guarantor, blocked fundsPre-approval by Compliance
Channel RiskMethod of onboarding or transactionOnline, remote, agent-assistedVerification tiering
Transaction RiskFrequency, value, and complexityLarge cross-border transfersReal-time monitoring and alerts

Risk Levels and Actions

Risk LevelScore RangeRequirements
Low1–5Standard CDD; routine monitoring
Medium6–10CDD + 24-month review
High11–15EDD; senior management approval; 12-month re-verification

Risk scores are calculated automatically by the Coral Commerce AML engine and manually reviewed by Compliance quarterly.

22. Customer Identification (KYC) Requirements

22.1. Individual Clients

RequirementAcceptable DocumentsNotes
Proof of IdentityU.S. Passport, Driver’s License, State IDMust be current and legible
Proof of AddressUtility bill, bank statement, or lease (≤90 days old)Must match stated residence
SSN or ITIN VerificationSocial Security Number or Individual Taxpayer IDVerified electronically
Source of FundsBank statement, pay stub, tax returnRequired for all escrow deposits

22.2. Business Clients

RequirementAcceptable DocumentsNotes
Business Formation DocumentsArticles of Incorporation or OrganizationCertified copy required
EIN VerificationIRS-issued Employer Identification NumberVerified via IRS portal
Ownership and ControlList of all owners (≥25%)Obtain individual KYC on each
Operating AddressLease, business license, or utility billMust be U.S.-based for primary registration
Source of FundsFinancial statements, invoices, contractsReviewed for plausibility and consistency

22.3. High-Risk Entities (EDD Required)

  • Non-profits, foundations, and trusts.
  • Politically Exposed Persons (PEPs).
  • Clients with foreign beneficial owners.
  • Escrow counterparties from or transacting with FATF-listed jurisdictions.

EDD includes verification of source of wealth, media screening, and Compliance Officer approval.

23. Red-Flag Indicators of Suspicious Activity

23.1. Customer Behaviour

  • Reluctance to provide identification or supporting documents.
  • Use of intermediaries without clear business purpose.
  • Requests for anonymity or avoidance of recordkeeping.
  • Mismatch between stated purpose and transactional behaviour.

23.2. Transactional Behaviour

  • Repeated deposits just under reporting thresholds.
  • Round-number transactions inconsistent with legitimate activity.
  • Movement of funds between multiple escrow accounts in short succession.
  • Unexplained urgency or pressure to complete transfers.
  • Reversal or cancellation of legitimate escrow agreements without cause.

23.3. Geographic and Counterparty Patterns

  • Transfers involving jurisdictions with weak AML regimes.
  • Counterparties located in known secrecy or tax-haven territories.
  • Transactions referencing sanctioned or embargoed regions.
  • Use of correspondent accounts or layering across unrelated entities.

24. Suspicious Activity Reporting Templates

Internal Suspicious Transaction Report (ISTR)

FieldDescription
Date[MM/DD/YYYY]
Employee Name[Staff completing report]
Customer Name / ID[Full name or entity name]
Account Reference[Escrow or Guarantor ID]
Suspicious Activity Description[Narrative summary]
Transaction Value[USD equivalent]
Reason for Suspicion[Concise factual basis]
Action Taken[Freeze, escalate, or refer to Compliance]

FinCEN SAR Filing

The Compliance Officer files a Suspicious Activity Report (SAR) electronically via FinCEN BSA E-Filing System including:

  • Customer details and identifiers.
  • Nature, date, and amount of suspicious transactions.
  • Narrative explanation of suspicious behaviour.
  • Relevant supporting documentation.

SAR filings are confidential and retained for five years.

25. Recordkeeping & Retention Standards

Celtouch maintains AML-related records for five years after:

  • Account closure, or
  • Completion of a transaction, whichever is later.

Records include:

  • KYC and identification data.
  • Transaction logs and audit trails.
  • SARs, ISTRs, and investigation notes.
  • Staff training records.
  • Audit and regulatory correspondence.

All records are encrypted, access-controlled, and periodically tested for integrity.

26. Partner & Correspondent Due Diligence

Celtouch conducts Partner Due Diligence (PDD) for all counterparties that facilitate escrow, payment processing, or custodial services.

Minimum PDD Requirements

  • Proof of business registration and licensing.
  • AML policy and compliance officer contact.
  • Confirmation of adherence to BSA, AMLA, and OFAC regulations.
  • Annual attestation of compliance and reporting history.
  • Review of enforcement or disciplinary actions (if any).

27. Training & Competence Matrix

Training ModuleTarget GroupFrequencyDescription
AML/CFT FundamentalsAll employeesAnnualOverview of U.S. AML laws, obligations, and penalties
KYC/CDD ProcessOnboarding & OperationsAnnualCustomer verification and documentation standards
Transaction Monitoring & Red FlagsCompliance, OperationsBiannualIdentification of unusual patterns and escalation
SAR Preparation & FinCEN ReportingCompliance staffAnnualProcedures for filing SARs electronically
OFAC Sanctions ScreeningFinance & OperationsAnnualManaging and reporting blocked transactions
Data Protection & PrivacyAll staffAnnualGLBA and state privacy law compliance

Records of training attendance and assessment results are stored for five years.

28. Governance & Accountability

28.1. Board of Directors

The Board of Celtouch bears ultimate responsibility for AML/CFT compliance and will:

  • Review quarterly AML reports.
  • Approve the AML policy and budget allocations.
  • Ensure the Compliance Officer’s independence and resources.

28.2. Designated Compliance Officer (DCO)

  • Oversees all AML/CFT systems and filings.
  • Has direct access to senior management and the Board.
  • Liaises with regulators and law enforcement agencies.

28.3. Management Responsibility

Department heads must ensure operational compliance and promptly escalate issues to the DCO.

29. Policy Attestation

By resolution of the Board of Directors of Celtouch, it is hereby confirmed that:

  • Celtouch maintains and implements AML/CFT policies compliant with U.S. federal laws including the BSA, AMLA, and Patriot Act.
  • The company cooperates fully with FinCEN, OFAC, and other competent authorities.
  • All employees are trained and obligated to comply with this policy.
  • Non-compliance may result in termination and legal prosecution under U.S. law.

Effective Date: 05 August 2025


Next Review Date: 05 August 2026

Signed on behalf of Celtouch:

_____________________________


Alioune Kane, Chairperson, Board of Directors, 
Date: 05 August 2025

_____________________________


Gerry van Heerden, 
Designated Compliance Officer, 
Date: 05 August 2025

30. Appendix A – Reference Frameworks

  • Bank Secrecy Act (BSA), 31 U.S.C. §§ 5311–5330
  • Anti-Money Laundering Act of 2020 (AMLA)
  • U.S.A. Patriot Act (Title III)
  • Office of Foreign Assets Control (OFAC) Regulations
  • Financial Crimes Enforcement Network (FinCEN) Guidance
  • FATF 40 Recommendations (2023 Revision)
  • Wolfsberg Group Principles (2022 Edition)
  • Basel Committee AML Guidelines

31. Appendix B – Document Control

VersionDateAuthorDescriptionApproved By
1.0[Insert]Compliance DepartmentInitial release (U.S.-aligned)Board of Directors
1.1[Future]Compliance DepartmentAnnual review updatesBoard of Directors

Archived versions retained for a minimum of ten (10) years.

32. Appendix C – Compliance Contacts

Designated Compliance Officer (DCO)


Name: Gerry van Heerden

Email: gerry@celtouch.com


Phone: +27 72 890 9790

33. Appendix D – Acronyms & Abbreviations (U.S. Version)

AcronymFull TermExplanation / Context
AIArtificial IntelligenceUsed in Celtouch’s automated monitoring and pattern-recognition systems.
AMLAnti-Money LaunderingFramework of U.S. laws and controls to prevent disguising proceeds of crime.
AML/CFTAnti-Money Laundering and Counter-Terrorist FinancingCombined reference to AML and TF measures.
AMLAAnti-Money Laundering Act of 2020 (U.S.)Updated U.S. AML legislation under the Bank Secrecy Act framework.
BSABank Secrecy ActPrimary U.S. AML statute requiring record-keeping and reporting of suspicious activity.
CDDCustomer Due DiligenceIdentification and verification process for customers under the FinCEN CDD Rule.
CFTCounter-Terrorist FinancingMeasures to prevent the collection or use of funds for terrorism.
DCODesignated Compliance OfficerSenior officer responsible for AML/CFT oversight at Celtouch.
EDDEnhanced Due DiligenceAdditional scrutiny applied to higher-risk clients or transactions.
EUEuropean UnionMentioned only for sanctions screening against the EU Consolidated List.
FATFFinancial Action Task ForceInter-governmental body that sets global AML/CFT standards; U.S. is a member.
FATF 40FATF 40 RecommendationsInternationally recognised AML/CFT framework adopted by the U.S. through the BSA.
FBIFederal Bureau of InvestigationMay receive referrals or coordinate on AML/CFT enforcement actions.
FCPAForeign Corrupt Practices ActU.S. law prohibiting bribery of foreign officials; relevant to PEP and corruption risk.
FDICFederal Deposit Insurance CorporationOversees safety and compliance for U.S. insured institutions.
FinCENFinancial Crimes Enforcement NetworkThe U.S. Financial Intelligence Unit under the Treasury Department.
FATCAForeign Account Tax Compliance ActU.S. regime requiring disclosure of offshore accounts (used for tax-information matching).
FIUFinancial Intelligence UnitIn the U.S., this role is performed by FinCEN.
GDPRGeneral Data Protection RegulationEU privacy regulation referenced only when processing EU-resident data.
HRHuman ResourcesDepartment responsible for employee compliance acknowledgements.
ISTRInternal Suspicious Transaction ReportInternal form submitted by staff to the Compliance Officer.
IRSInternal Revenue ServiceU.S. tax authority; relevant for verifying taxpayer identification (TIN/EIN).
KYCKnow-Your-CustomerPractical implementation of CDD requirements.
MLMoney LaunderingConcealment of the origins of illegally obtained money.
NMLSNationwide Multistate Licensing SystemRegistry for U.S. money-service businesses and fintech compliance licensing.
OFACOffice of Foreign Assets ControlU.S. Treasury office administering and enforcing sanctions programs.
PEPPolitically Exposed PersonIndividual holding, or previously holding, a prominent public function.
PDDPartner Due DiligenceReview of counterparties such as U.S. or foreign banks and fintech partners.
RBARisk-Based ApproachAllocating AML resources proportionate to assessed risk.
SARSuspicious Activity ReportFormal report filed with FinCEN regarding suspected ML/TF.
SDDSimplified Due DiligenceReduced CDD applied to low-risk situations where legally permitted.
SDNSpecially Designated NationalsOFAC’s list of sanctioned individuals and entities.
SECSecurities and Exchange CommissionRegulates U.S. securities-related AML compliance.
STRSuspicious Transaction ReportEquivalent term to SAR in some non-U.S. jurisdictions.
TFTerrorist FinancingFunding or financial support of terrorist acts or organisations.
TINTaxpayer Identification NumberUsed for individual or corporate tax verification in the U.S.
U.S. Patriot ActUniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001U.S. law expanding AML/CFT powers, especially under Title III.
UNUnited NationsProvides international sanctions lists mirrored in OFAC data.
UNSCUnited Nations Security CouncilSource of global sanctions resolutions adopted by OFAC.
USAUnited States of AmericaCeltouch’s current operating jurisdiction.
VATValue-Added TaxMentioned only when screening foreign corporate clients.
Wolfsberg GroupWolfsberg Group PrinciplesFinancial-industry AML best-practice standards referenced by U.S. institutions.
  • AML Policy
  • Complaints Policy
  • Cookie Policy
  • COPPA Compliance
  • Copyright Policy
  • Information Security Policy
  • Merchant of Reference
  • OFAC Compliance
  • Payments
  • Piracy Policy
  • Play Nice Policy
  • Privacy Policy
  • Taxes
  • Terms and Conditions of Use
  • Treat Customers Fairly
COPYRIGHT © 2025 - Celtouch LLC, All Rights Reserved // Designed By - ZeeTheme