Scope of AML/KYC Controls
Sanctions and risk screening supported by LSEG World-Check One compliance data infrastructure.
Sanctions & Risk Screening Controls
Counterparty screening is performed as part of the AML/KYC onboarding and risk assessment framework.
- Sanctions list screening
- Politically Exposed Person (PEP) identification
- Adverse media and reputational review
- Jurisdictional and exposure risk indicators
Screening is conducted using LSEG World-Check One as a structured compliance data input within the internal review workflow.
Screening outcomes are evaluated together with identity verification, source-of-funds documentation, and transaction purpose analysis prior to onboarding approval.
Use of screening tools supports internal risk assessment and does not constitute regulatory licensing, supervisory approval, or financial authorization.
Onboarding & Transaction Control Perimeter
The AML/KYC control framework applies to counterparties entering into physical gold sale and delivery execution within the defined contractual perimeter.
Controls are initiated prior to contractual binding and remain embedded through payment confirmation, allocation, and transaction record formation.
- Counterparty identification and authority validation
- Beneficial ownership and corporate structure review
- Source-of-funds and source-of-wealth assessment (where applicable)
- Transaction purpose and economic rationale review
- Risk-based escalation procedures where required
Control measures are proportionate to counterparty profile, jurisdictional exposure, and transaction structure.
The framework supports risk-based onboarding approval and transaction execution controls within the operational scope of physical gold trading and delivery.
Beneficial Ownership & Corporate Structure Review
The review examines direct and indirect ownership chains, control pathways, layered corporate entities, and cross-jurisdictional holding structures.
Ownership tracing extends beyond nominal shareholding and evaluates:
Multi-tier holding companies
Nominee or fiduciary arrangements
Dispersed ownership with control concentration
Voting rights asymmetry
Offshore or high-risk jurisdiction exposure
Where ownership complexity exceeds defined transparency thresholds, enhanced review protocols are activated. These may include supplementary documentation requests, independent registry verification, and escalation to compliance review authority.
The review produces a documented ownership map linked to the counterparty compliance file and the transaction reference, ensuring traceability and regulatory defensibility.
Ownership Control Outputs
Counterparty Identification Gate
Transaction activation is contingent upon identity validation clearance.
Beneficial Ownership Mapping
Complex structures trigger enhanced review procedures.
Source-of-Funds Assessment
Heightened scrutiny applies to cross-border or high-value transfers.
Risk Profiling & Classification
Review depth scales according to risk profile.
Transaction Surveillance Controls
Monitoring operates through defined review checkpoints within the transaction lifecycle.
Compliance Record Formation
Records are retained under defined documentation controls.
Step-by-Step AML/KYC Control Sequence
AML/KYC controls are activated as a structured sequence of review gates embedded within the lifecycle of physical gold transactions.
Regulatory Positioning & Control Boundaries
AML and KYC controls are applied within the defined contractual perimeter of physical gold sales and delivery execution. The framework governs transaction eligibility, documentation integrity, and compliance record formation across the transaction lifecycle.
Jurisdictional Application Perimeter
Compliance obligations are calibrated according to the jurisdictional nexus of the transaction and the regulatory exposure connected to counterparty and settlement structure.
- Counterparty jurisdiction of incorporation
- Location of transaction execution
- Settlement routing pathway and payment channel
- Cross-border exposure and regulatory touchpoints
Applicable AML/KYC standards are applied in accordance with statutory requirements relevant to the transaction structure.
Transaction-Linked Compliance Model
AML/KYC controls operate as transaction-triggered review gates embedded within the execution lifecycle.
Controls are activated:
- Prior to contractual binding
- Prior to settlement confirmation
- Upon material modification of transaction parameters
- When risk reclassification thresholds are met
Each activation produces a documented compliance record linked to the transaction reference and retained under defined documentation controls.
Responsibility Segmentation
The compliance framework defines operational boundaries between engaged parties within the transaction architecture.
- Vault operators apply their own regulatory compliance standards
- Logistics providers operate under transportation and security regulations
- Financial institutions apply independent AML supervision frameworks
AML/KYC controls described on this page apply to counterparty verification, transaction eligibility, and compliance record formation within the defined execution model.
Regulatory Escalation & Reporting Interface
Where defined risk thresholds are exceeded, escalation procedures are activated.
- Enhanced documentation requests
- Internal compliance authority review
- Temporary suspension of transaction processing
- Statutory reporting under applicable regulatory requirements
Escalation outcomes are documented within the compliance record set.
Documentation & Audit Defensibility
Each review stage generates structured compliance artifacts supporting audit reconstruction and regulatory defensibility.
- Counterparty identification file
- Beneficial ownership documentation
- Screening logs and sanctions verification records
- Risk classification record
- Compliance approval memorandum
Compliance documentation forms part of the transaction evidence set and remains linked to the contractual lifecycle of the transaction.
Frequently asked questions
For natural persons, documentation typically includes:
– Government-issued identification
– Proof of residential address
– Source-of-funds declaration
– Source-of-wealth explanation where required
For legal entities, documentation typically includes:
– Certificate of incorporation and constitutional documents
– Shareholder register and ownership structure chart
– Director and authorized signatory details
– Ultimate Beneficial Owner (UBO) disclosures
– Description of business activities
– Supporting financial documentation
Where ownership chains are layered, cross-border, or involve high-risk jurisdictions, enhanced documentation and independent registry verification may be required.
Verification may include:
– Bank statements
– Audited financial statements
– Transaction history
– Contractual documentation
– Invoices or asset sale agreements
– Independent legal or accounting confirmations
For complex or high-value transactions, funds flow analysis and counterparty tracing may be conducted to establish transparency and regulatory defensibility.
Updates are required:
– Upon document expiration
– Upon change in ownership or control
– Upon change in authorized signatories
– Upon jurisdictional relocation
– When transaction behavior deviates from declared profile
Higher-risk classifications may require more frequent review cycles and enhanced monitoring.
Screening may include:
– Global sanctions lists
– Politically Exposed Person (PEP) registries
– Adverse media databases
– Law enforcement notices
– Financial crime watchlists
Screening occurs during onboarding and continues during transaction execution and settlement stages where applicable.
Assessment includes:
– Direct and indirect shareholding review
– Control rights analysis
– Multi-tier ownership tracing
– Nominee or fiduciary structure examination
– Cross-jurisdictional holding review
Where complexity exceeds predefined thresholds, enhanced review procedures are activated, including registry validation and compliance escalation.
Controls include:
– Encrypted storage environments
– Restricted role-based access
– Segregated compliance files
– Secure document transmission channels
– Controlled retention and archival procedures
Data handling aligns with applicable data protection laws within the jurisdictions of operation.
Oversight includes:
– Onboarding verification
– Ongoing monitoring
– Escalation and enhanced due diligence
– Documentation retention
– Regulatory interaction where required
Procedures may be subject to internal audit and independent review.
Alignment may include:
– FATF recommendations
– OECD transparency principles
– EU AML directives where relevant
– Applicable jurisdictional regulations governing counterparties or vault operators
Application depends on transaction structure, jurisdictional nexus, and counterparty classification.
– The transaction is flagged
– Enhanced due diligence is initiated
– Execution may be paused pending review
– Escalation procedures are triggered
– Reporting obligations are fulfilled where legally required
Transaction continuation is subject to documented compliance clearance.
Transaction timing depends on:
– Completeness of submitted documentation
– Risk classification
– Complexity of ownership structure
– Cross-border exposure
– Banking partner requirements
Settlement proceeds only after compliance clearance and documentation validation.
Detailed procedural documentation is incorporated into contractual onboarding and applicable agreements governing transaction execution and custody arrangements.