قوانین شرط بندی در ایران | بهروز ۱۴۰۴
Anti-Money Laundering (AML) & Know-Your-Customer (KYC) Policy — skgonline | https://shartiskg.com/ 💼🛡️
This Anti-Money Laundering (AML) and Know-Your-Customer (KYC) Policy (the “Policy”) sets out the principles, controls, and procedures used by skgonline (accessible at https://shartiskg.com/) to prevent our learning platform and any related financial interactions (e.g., course purchases, refunds, affiliate payouts, sponsorships) from being used for money laundering (ML), terrorism financing (TF), fraud, or other illicit conduct. We are an education-focused platform and do not provide gambling or betting services. Nevertheless, consistent with global best practices, we apply proportionate AML/KYC safeguards to protect users and the integrity of our systems. ✅
1) Scope & Alignment with EEAT and YMYL 📚
Because our content may influence user decisions in sensitive domains (YMYL), and because we accept payments for educational services, we adopt rigorous editorial and compliance standards consistent with EEAT (Experience, Expertise, Authoritativeness, Trustworthiness). This Policy applies to:
2) Governance & Responsibilities 🧭
Policy Owner: Compliance Lead (reports to executive management). AMLCO: An Anti-Money Laundering Compliance Officer (AMLCO) oversees implementation, training, monitoring, recordkeeping, and reporting. The AMLCO may delegate tasks to trained analysts while remaining accountable.
3) Legal Baseline & Best-Practice Frameworks ⚖️
While skgonline is an educational platform, our internal AML/KYC framework is informed by widely accepted standards, including FATF recommendations and relevant data-protection principles. We do not claim licensing as a financial or gambling institution; this Policy is a good-faith, risk-based framework to protect users and our brand.
4) Definitions 🔍
5) Risk-Based Approach (RBA) 🧮
We calibrate controls to the assessed risk of a user, transaction type, payment rail, and geography. Risk factors include unusual velocity, mismatched identities, proxy/obfuscation signals, sanctioned regions, and complex routing patterns.
5.1 Geographic Risk Tiers 🌍
6) Customer Identification & Verification (KYC) 🔐
We verify identity proportional to risk and transactional thresholds. Users may be asked to complete KYC before certain actions (e.g., large payments or payouts).
6.1 Core KYC Data
6.2 Verification Thresholds & Triggers
7) Source of Funds / Source of Wealth (SoF/SoW) 💳
Where required, we may request documents demonstrating the legitimate origin of funds/wealth (e.g., payslips, business ownership, tax filings, inheritance paperwork, investment statements). If legitimacy cannot be established, we may decline or reverse the transaction and/or restrict the account.
8) Payment Rules & Red Flags 🚩
9) Ongoing Monitoring 🔁
Automated and manual reviews assess transaction behavior against KYC baselines. Alerts are investigated by trained staff; unresolved anomalies may result in temporary holds, additional documentation requests, or closure.
10) Recordkeeping 🗂️
11) Data Protection & Privacy 🔏
We apply data-minimization and security safeguards. Personal data are processed for legitimate purposes (KYC, fraud prevention, compliance) and are stored securely. We do not sell personal data. We may disclose data to competent authorities if required by law. For inquiries, contact: support@shartiskg.com.