AML & KYC Controls in Physical Gold Transactions

AML and KYC controls are applied prior to contractual execution and remain embedded across the transaction lifecycle of physical gold sales and delivery execution.
The framework defines counterparty identification, beneficial ownership verification, jurisdictional risk classification, source-of-funds assessment, and transaction monitoring controls aligned with regulatory requirements.
Controls are activated through documented review gates and produce verifiable compliance records linked to the transaction reference.
AML & KYC Controls in Physical Gold Transactions

Scope of AML/KYC Controls

Sanctions and risk screening supported by LSEG World-Check One compliance data infrastructure.

Sanctions & Risk Screening Controls

Counterparty screening is performed as part of the AML/KYC onboarding and risk assessment framework.

  • Sanctions list screening
  • Politically Exposed Person (PEP) identification
  • Adverse media and reputational review
  • Jurisdictional and exposure risk indicators

Screening is conducted using LSEG World-Check One as a structured compliance data input within the internal review workflow.

Screening outcomes are evaluated together with identity verification, source-of-funds documentation, and transaction purpose analysis prior to onboarding approval.

Use of screening tools supports internal risk assessment and does not constitute regulatory licensing, supervisory approval, or financial authorization.

Onboarding & Transaction Control Perimeter

The AML/KYC control framework applies to counterparties entering into physical gold sale and delivery execution within the defined contractual perimeter.

Controls are initiated prior to contractual binding and remain embedded through payment confirmation, allocation, and transaction record formation.

  • Counterparty identification and authority validation
  • Beneficial ownership and corporate structure review
  • Source-of-funds and source-of-wealth assessment (where applicable)
  • Transaction purpose and economic rationale review
  • Risk-based escalation procedures where required

Control measures are proportionate to counterparty profile, jurisdictional exposure, and transaction structure.

The framework supports risk-based onboarding approval and transaction execution controls within the operational scope of physical gold trading and delivery.

Beneficial Ownership & Corporate Structure Review

Beneficial ownership analysis establishes the natural persons exercising ultimate ownership or effective control over the counterparty entering into a physical gold transaction.
The review examines direct and indirect ownership chains, control pathways, layered corporate entities, and cross-jurisdictional holding structures.
Ownership tracing extends beyond nominal shareholding and evaluates:
Multi-tier holding companies
Nominee or fiduciary arrangements
Dispersed ownership with control concentration
Voting rights asymmetry
Offshore or high-risk jurisdiction exposure
Where ownership complexity exceeds defined transparency thresholds, enhanced review protocols are activated. These may include supplementary documentation requests, independent registry verification, and escalation to compliance review authority.
The review produces a documented ownership map linked to the counterparty compliance file and the transaction reference, ensuring traceability and regulatory defensibility.

Ownership Control Outputs

The beneficial ownership review generates structured compliance artifacts supporting audit reconstruction and transaction approval controls.
Ultimate Beneficial Owner (UBO) identification record
Ownership percentage and control threshold analysis
Corporate structure diagram and control mapping
Jurisdictional exposure classification
PEP and sanctions screening confirmation

Counterparty Identification Gate

Verification of legal entity status, authorized signatories, and documentary authority is completed prior to contractual binding.
Transaction activation is contingent upon identity validation clearance.

Beneficial Ownership Mapping

Ultimate beneficial owners are identified through multi-layer ownership tracing, control threshold analysis, and jurisdictional exposure review.
Complex structures trigger enhanced review procedures.

Source-of-Funds Assessment

Transaction funding origin is evaluated for economic rationale, documented provenance, and alignment with declared business activity.
Heightened scrutiny applies to cross-border or high-value transfers.

Risk Profiling & Classification

Each counterparty is assigned a documented risk classification based on ownership structure, jurisdictional exposure, transaction size, and historical activity patterns.
Review depth scales according to risk profile.

Transaction Surveillance Controls

Transaction parameters are screened against sanctions databases, PEP lists, and internal escalation thresholds.
Monitoring operates through defined review checkpoints within the transaction lifecycle.

Compliance Record Formation

Each AML/KYC review generates structured compliance artifacts, including screening logs, ownership documentation, and approval records linked to the transaction reference.
Records are retained under defined documentation controls.

Step-by-Step AML/KYC Control Sequence

AML/KYC controls are activated as a structured sequence of review gates embedded within the lifecycle of physical gold transactions.

Counterparty Pre-Screening
Preliminary sanctions and PEP screening is conducted prior to document intake. Jurisdictional exposure and high-risk indicators are assessed before compliance file creation.
Identity & Authority Verification
Legal entity documentation and representative authority are validated. Verification establishes contractual eligibility prior to transaction activation.
Beneficial Ownership Review
Ultimate beneficial owners are identified through layered ownership tracing. Complex structures trigger enhanced due diligence procedures.
Source-of-Funds Assessment
Declared funding origin is evaluated for economic rationale and regulatory alignment. High-value or cross-border transfers may require supplementary documentation.
Risk Classification & Approval
Counterparty risk rating is assigned based on ownership complexity, jurisdictional exposure, and transaction structure. Execution clearance is issued upon compliance approval.
Ongoing Transaction Surveillance
Transaction parameters are monitored against defined escalation thresholds, sanctions lists, and internal risk controls. Monitoring operates within the defined contractual lifecycle.
Compliance Record Finalization
Each review stage generates documented artifacts linked to the transaction reference. Records are retained under defined documentation control standards.

Regulatory Positioning & Control Boundaries

AML and KYC controls are applied within the defined contractual perimeter of physical gold sales and delivery execution. The framework governs transaction eligibility, documentation integrity, and compliance record formation across the transaction lifecycle.

Jurisdictional Application Perimeter

Compliance obligations are calibrated according to the jurisdictional nexus of the transaction and the regulatory exposure connected to counterparty and settlement structure.

  • Counterparty jurisdiction of incorporation
  • Location of transaction execution
  • Settlement routing pathway and payment channel
  • Cross-border exposure and regulatory touchpoints

Applicable AML/KYC standards are applied in accordance with statutory requirements relevant to the transaction structure.

Transaction-Linked Compliance Model

AML/KYC controls operate as transaction-triggered review gates embedded within the execution lifecycle.

Controls are activated:

  • Prior to contractual binding
  • Prior to settlement confirmation
  • Upon material modification of transaction parameters
  • When risk reclassification thresholds are met

Each activation produces a documented compliance record linked to the transaction reference and retained under defined documentation controls.

Responsibility Segmentation

The compliance framework defines operational boundaries between engaged parties within the transaction architecture.

  • Vault operators apply their own regulatory compliance standards
  • Logistics providers operate under transportation and security regulations
  • Financial institutions apply independent AML supervision frameworks

AML/KYC controls described on this page apply to counterparty verification, transaction eligibility, and compliance record formation within the defined execution model.

Regulatory Escalation & Reporting Interface

Where defined risk thresholds are exceeded, escalation procedures are activated.

  • Enhanced documentation requests
  • Internal compliance authority review
  • Temporary suspension of transaction processing
  • Statutory reporting under applicable regulatory requirements

Escalation outcomes are documented within the compliance record set.

Documentation & Audit Defensibility

Each review stage generates structured compliance artifacts supporting audit reconstruction and regulatory defensibility.

  • Counterparty identification file
  • Beneficial ownership documentation
  • Screening logs and sanctions verification records
  • Risk classification record
  • Compliance approval memorandum

Compliance documentation forms part of the transaction evidence set and remains linked to the contractual lifecycle of the transaction.

Frequently asked questions

Institutional-Grade Security
What documentation is required for AML/KYC onboarding?
AML/KYC documentation is determined by counterparty classification, legal form, jurisdictional exposure, transaction structure, and risk profile.
For natural persons, documentation typically includes:
– Government-issued identification
– Proof of residential address
– Source-of-funds declaration
– Source-of-wealth explanation where required
For legal entities, documentation typically includes:
– Certificate of incorporation and constitutional documents
– Shareholder register and ownership structure chart
– Director and authorized signatory details
– Ultimate Beneficial Owner (UBO) disclosures
– Description of business activities
– Supporting financial documentation
Where ownership chains are layered, cross-border, or involve high-risk jurisdictions, enhanced documentation and independent registry verification may be required.
Source of funds verification evaluates the lawful origin of capital used for gold purchase, allocation, or custody.
Verification may include:
– Bank statements
– Audited financial statements
– Transaction history
– Contractual documentation
– Invoices or asset sale agreements
– Independent legal or accounting confirmations
For complex or high-value transactions, funds flow analysis and counterparty tracing may be conducted to establish transparency and regulatory defensibility.
KYC records are subject to periodic review based on risk classification.
Updates are required:
– Upon document expiration
– Upon change in ownership or control
– Upon change in authorized signatories
– Upon jurisdictional relocation
– When transaction behavior deviates from declared profile
Higher-risk classifications may require more frequent review cycles and enhanced monitoring.
Transactions and counterparties are screened against international sanctions and compliance databases.
Screening may include:
– Global sanctions lists
– Politically Exposed Person (PEP) registries
– Adverse media databases
– Law enforcement notices
– Financial crime watchlists
Screening occurs during onboarding and continues during transaction execution and settlement stages where applicable.
Beneficial ownership analysis identifies natural persons exercising ultimate ownership or effective control over a legal entity.
Assessment includes:
– Direct and indirect shareholding review
– Control rights analysis
– Multi-tier ownership tracing
– Nominee or fiduciary structure examination
– Cross-jurisdictional holding review
Where complexity exceeds predefined thresholds, enhanced review procedures are activated, including registry validation and compliance escalation.
Client data protection follows documented data governance and access control procedures.
Controls include:
– Encrypted storage environments
– Restricted role-based access
– Segregated compliance files
– Secure document transmission channels
– Controlled retention and archival procedures
Data handling aligns with applicable data protection laws within the jurisdictions of operation.
AML/KYC procedures are administered by a designated compliance function operating within documented internal control frameworks.
Oversight includes:
– Onboarding verification
– Ongoing monitoring
– Escalation and enhanced due diligence
– Documentation retention
– Regulatory interaction where required
Procedures may be subject to internal audit and independent review.
The compliance framework is structured in reference to internationally recognized financial crime prevention standards.
Alignment may include:
– FATF recommendations
– OECD transparency principles
– EU AML directives where relevant
– Applicable jurisdictional regulations governing counterparties or vault operators
Application depends on transaction structure, jurisdictional nexus, and counterparty classification.
If suspicious indicators are detected:
– The transaction is flagged
– Enhanced due diligence is initiated
– Execution may be paused pending review
– Escalation procedures are triggered
– Reporting obligations are fulfilled where legally required
Transaction continuation is subject to documented compliance clearance.
Standard onboarding and verification procedures are integrated into contractual execution workflows.
Transaction timing depends on:
– Completeness of submitted documentation
– Risk classification
– Complexity of ownership structure
– Cross-border exposure
– Banking partner requirements
Settlement proceeds only after compliance clearance and documentation validation.
A compliance framework summary may be provided upon request.
Detailed procedural documentation is incorporated into contractual onboarding and applicable agreements governing transaction execution and custody arrangements.

Request a LBMA refinery-origin gold proposal

Please submit your request and our team will contact you soon.
goldenarkreserve.com (Request Form)