Scope of AML/KYC Controls
The AML and KYC control framework applies to counterparties entering into physical gold sales and delivery execution within the defined contractual perimeter.
Controls are activated prior to contractual binding and remain embedded through payment confirmation, allocation, and transaction record formation.
- Counterparty identification and authority validation
- Beneficial ownership and corporate structure analysis
- Source-of-funds and source-of-wealth assessment
- Jurisdictional risk classification
- Transaction monitoring aligned with defined risk thresholds
The framework operates under a risk-based methodology, where the depth of verification, documentation requirements, and review intensity are calibrated according to counterparty profile, transaction structure, and jurisdictional exposure.
Each AML/KYC review produces documented compliance artifacts linked to the transaction reference, supporting audit reconstruction and regulatory defensibility.
Beneficial Ownership & Corporate Structure Review
The review examines direct and indirect ownership chains, control pathways, layered corporate entities, and cross-jurisdictional holding structures.
Ownership tracing extends beyond nominal shareholding and evaluates:
Multi-tier holding companies
Nominee or fiduciary arrangements
Dispersed ownership with control concentration
Voting rights asymmetry
Offshore or high-risk jurisdiction exposure
Where ownership complexity exceeds defined transparency thresholds, enhanced review protocols are activated. These may include supplementary documentation requests, independent registry verification, and escalation to compliance review authority.
The review produces a documented ownership map linked to the counterparty compliance file and the transaction reference, ensuring traceability and regulatory defensibility.
Ownership Control Outputs
Counterparty Identification Gate
Transaction activation is contingent upon identity validation clearance.
Beneficial Ownership Mapping
Complex structures trigger enhanced review procedures.
Source-of-Funds Assessment
Heightened scrutiny applies to cross-border or high-value transfers.
Risk Profiling & Classification
Review depth scales according to risk profile.
Transaction Surveillance Controls
Monitoring operates through defined review checkpoints within the transaction lifecycle.
Compliance Record Formation
Records are retained under defined documentation controls.
Step-by-Step AML/KYC Control Sequence
AML/KYC controls are activated as a structured sequence of review gates embedded within the lifecycle of physical gold transactions.
Regulatory Positioning & Control Boundaries
AML and KYC controls are applied within the defined contractual perimeter of physical gold sales and delivery execution. The framework governs transaction eligibility, documentation integrity, and compliance record formation across the transaction lifecycle.
Jurisdictional Application Perimeter
Compliance obligations are calibrated according to the jurisdictional nexus of the transaction and the regulatory exposure connected to counterparty and settlement structure.
- Counterparty jurisdiction of incorporation
- Location of transaction execution
- Settlement routing pathway and payment channel
- Cross-border exposure and regulatory touchpoints
Applicable AML/KYC standards are applied in accordance with statutory requirements relevant to the transaction structure.
Transaction-Linked Compliance Model
AML/KYC controls operate as transaction-triggered review gates embedded within the execution lifecycle.
Controls are activated:
- Prior to contractual binding
- Prior to settlement confirmation
- Upon material modification of transaction parameters
- When risk reclassification thresholds are met
Each activation produces a documented compliance record linked to the transaction reference and retained under defined documentation controls.
Responsibility Segmentation
The compliance framework defines operational boundaries between engaged parties within the transaction architecture.
- Vault operators apply their own regulatory compliance standards
- Logistics providers operate under transportation and security regulations
- Financial institutions apply independent AML supervision frameworks
AML/KYC controls described on this page apply to counterparty verification, transaction eligibility, and compliance record formation within the defined execution model.
Regulatory Escalation & Reporting Interface
Where defined risk thresholds are exceeded, escalation procedures are activated.
- Enhanced documentation requests
- Internal compliance authority review
- Temporary suspension of transaction processing
- Statutory reporting under applicable regulatory requirements
Escalation outcomes are documented within the compliance record set.
Documentation & Audit Defensibility
Each review stage generates structured compliance artifacts supporting audit reconstruction and regulatory defensibility.
- Counterparty identification file
- Beneficial ownership documentation
- Screening logs and sanctions verification records
- Risk classification record
- Compliance approval memorandum
Compliance documentation forms part of the transaction evidence set and remains linked to the contractual lifecycle of the transaction.
Frequently asked questions
For natural persons, documentation typically includes:
– Government-issued identification
– Proof of residential address
– Source-of-funds declaration
– Source-of-wealth explanation where required
For legal entities, documentation typically includes:
– Certificate of incorporation and constitutional documents
– Shareholder register and ownership structure chart
– Director and authorized signatory details
– Ultimate Beneficial Owner (UBO) disclosures
– Description of business activities
– Supporting financial documentation
Where ownership chains are layered, cross-border, or involve high-risk jurisdictions, enhanced documentation and independent registry verification may be required.