Scope of AML/KYC Controls
Sanctions and risk screening supported by LSEG World-Check One compliance data infrastructure.
Sanctions & Risk Screening Controls
Counterparty screening is performed as part of the AML/KYC onboarding and risk assessment framework.
- Sanctions list screening
- Politically Exposed Person (PEP) identification
- Adverse media and reputational review
- Jurisdictional and exposure risk indicators
Screening is conducted using LSEG World-Check One as a structured compliance data input within the internal review workflow.
Screening outcomes are evaluated together with identity verification, source-of-funds documentation, and transaction purpose analysis prior to onboarding approval.
Use of screening tools supports internal risk assessment and does not constitute regulatory licensing, supervisory approval, or financial authorization.
Onboarding & Transaction Control Perimeter
The AML/KYC control framework applies to counterparties entering into physical gold sale and delivery execution within the defined contractual perimeter.
Controls are initiated prior to contractual binding and remain embedded through payment confirmation, allocation, and transaction record formation.
- Counterparty identification and authority validation
- Beneficial ownership and corporate structure review
- Source-of-funds and source-of-wealth assessment (where applicable)
- Transaction purpose and economic rationale review
- Risk-based escalation procedures where required
Control measures are proportionate to counterparty profile, jurisdictional exposure, and transaction structure.
The framework supports risk-based onboarding approval and transaction execution controls within the operational scope of physical gold trading and delivery.
Beneficial Ownership & Corporate Structure Review
The review examines direct and indirect ownership chains, control pathways, layered corporate entities, and cross-jurisdictional holding structures.
Ownership tracing extends beyond nominal shareholding and evaluates:
Multi-tier holding companies
Nominee or fiduciary arrangements
Dispersed ownership with control concentration
Voting rights asymmetry
Offshore or high-risk jurisdiction exposure
Where ownership complexity exceeds defined transparency thresholds, enhanced review protocols are activated. These may include supplementary documentation requests, independent registry verification, and escalation to compliance review authority.
The review produces a documented ownership map linked to the counterparty compliance file and the transaction reference, ensuring traceability and regulatory defensibility.
Ownership Control Outputs
Counterparty Identification Gate
Transaction activation is contingent upon identity validation clearance.
Beneficial Ownership Mapping
Complex structures trigger enhanced review procedures.
Source-of-Funds Assessment
Heightened scrutiny applies to cross-border or high-value transfers.
Risk Profiling & Classification
Review depth scales according to risk profile.
Transaction Surveillance Controls
Monitoring operates through defined review checkpoints within the transaction lifecycle.
Compliance Record Formation
Records are retained under defined documentation controls.
Step-by-Step AML/KYC Control Sequence
AML/KYC controls are activated as a structured sequence of review gates embedded within the lifecycle of physical gold transactions.
Regulatory Positioning & Control Boundaries
AML and KYC controls are applied within the defined contractual perimeter of physical gold sales and delivery execution. The framework governs transaction eligibility, documentation integrity, and compliance record formation across the transaction lifecycle.
Jurisdictional Application Perimeter
Compliance obligations are calibrated according to the jurisdictional nexus of the transaction and the regulatory exposure connected to counterparty and settlement structure.
- Counterparty jurisdiction of incorporation
- Location of transaction execution
- Settlement routing pathway and payment channel
- Cross-border exposure and regulatory touchpoints
Applicable AML/KYC standards are applied in accordance with statutory requirements relevant to the transaction structure.
Transaction-Linked Compliance Model
AML/KYC controls operate as transaction-triggered review gates embedded within the execution lifecycle.
Controls are activated:
- Prior to contractual binding
- Prior to settlement confirmation
- Upon material modification of transaction parameters
- When risk reclassification thresholds are met
Each activation produces a documented compliance record linked to the transaction reference and retained under defined documentation controls.
Responsibility Segmentation
The compliance framework defines operational boundaries between engaged parties within the transaction architecture.
- Vault operators apply their own regulatory compliance standards
- Logistics providers operate under transportation and security regulations
- Financial institutions apply independent AML supervision frameworks
AML/KYC controls described on this page apply to counterparty verification, transaction eligibility, and compliance record formation within the defined execution model.
Regulatory Escalation & Reporting Interface
Where defined risk thresholds are exceeded, escalation procedures are activated.
- Enhanced documentation requests
- Internal compliance authority review
- Temporary suspension of transaction processing
- Statutory reporting under applicable regulatory requirements
Escalation outcomes are documented within the compliance record set.
Documentation & Audit Defensibility
Each review stage generates structured compliance artifacts supporting audit reconstruction and regulatory defensibility.
- Counterparty identification file
- Beneficial ownership documentation
- Screening logs and sanctions verification records
- Risk classification record
- Compliance approval memorandum
Compliance documentation forms part of the transaction evidence set and remains linked to the contractual lifecycle of the transaction.
Frequently asked questions
For natural persons, documentation typically includes:
– Government-issued identification
– Proof of residential address
– Source-of-funds declaration
– Source-of-wealth explanation where required
For legal entities, documentation typically includes:
– Certificate of incorporation and constitutional documents
– Shareholder register and ownership structure chart
– Director and authorized signatory details
– Ultimate Beneficial Owner (UBO) disclosures
– Description of business activities
– Supporting financial documentation
Where ownership chains are layered, cross-border, or involve high-risk jurisdictions, enhanced documentation and independent registry verification may be required.