AML CTF Policy

Last updated April 8, 2026

Anti-Money Laundering & Counter-Terrorism Financing (AML/CTF) Policy

AUDC Pty Ltd is committed to maintaining the highest standards of integrity, transparency, and compliance in all operations.
This policy outlines our approach to preventing, detecting, and responding to money laundering and terrorism financing risks.

1. Purpose and Scope

Purpose

The purpose of this AML/CTF Policy is to establish a strong framework to safeguard our platform and ecosystem from misuse.
It ensures compliance with applicable regulations, protects our stakeholders, and supports global financial security standards.

This policy is designed to:

  • Ensure Compliance: Adhere to all applicable AML/CTF laws and regulations.
  • Manage Risk: Identify, assess, and mitigate financial crime risks.
  • Maintain Integrity: Prevent the use of our services for illicit purposes.
  • Promote Awareness: Foster a strong internal culture of compliance.
  • Support Transparency: Enable clear and accountable financial interactions.

Scope

This policy applies to all activities conducted by AUDC Pty Ltd across its global operations.

  • All employees, directors, and management
  • Business partners, affiliates, and service providers
  • All customers and users of our services
  • All products, platforms, and digital asset transactions
  • All jurisdictions in which we operate

Compliance with this policy is mandatory. Failure to comply may result in disciplinary action or termination of services.

2. Regulatory Standards

AUDC Pty Ltd does not currently provide designated services under the Anti-Money Laundering and Counter-Terrorism Financing Act 2006 (Cth) and is not required to be registered with AUSTRAC.

Notwithstanding this, we recognise that money laundering and terrorism financing are serious global risks.
We have implemented appropriate internal controls, procedures, and systems to manage these risks effectively.

3. Procedures and Guidelines

Money Laundering and Terrorism Financing

Money Laundering is the process of concealing the origin of funds derived from criminal activity. It generally occurs in three stages:

  • Placement: Introducing illicit funds into the financial system
  • Layering: Obscuring the origin through complex transactions
  • Integration: Reintroducing funds as apparently legitimate assets

Terrorism Financing involves providing financial support to terrorist activities or organisations, including operational funding and network support.

Customer Information Requests

Where necessary, we may request additional information from customers to assess and manage risk.
Failure to provide requested information may result in restrictions or termination of services.

Customer Due Diligence (CDD)

We conduct appropriate verification of customers before providing services. This includes assessing legitimacy, regulatory compliance, and alignment with our risk framework.

Enhanced Due Diligence (EDD)

Additional checks may be conducted for higher-risk customers, including politically exposed persons (PEPs) or where suspicious activity is identified.

PEP and Sanctions Screening

We screen customers and associated parties against global sanctions lists and identify politically exposed persons to manage elevated risk.

Data Integrity

Customer information is verified using reliable, independent, and secure data sources, including government and regulatory databases.

Risk Assessment

We apply a risk-based approach considering customer type, transaction behaviour, geographic exposure, and service usage.

Transaction Monitoring

We monitor transactions to identify unusual or suspicious activity. This includes manual oversight and the planned implementation of automated monitoring technologies.

International Compliance

We align with international AML/CTF standards, including those set by the Financial Action Task Force (FATF), and support cross-border regulatory cooperation.

Address Blacklisting Approach

AUDD operates as a public, permissionless token and does not implement address blacklisting at a protocol level.
Instead, risk is managed through strict onboarding, monitoring, and oversight of authorised distributors.

Incident Reporting

Suspicious activities are escalated internally and assessed promptly. Appropriate action is taken in line with regulatory expectations and risk management procedures.

Privacy and Data Protection

We are committed to protecting customer privacy. Personal information is used solely for service provision, securely stored, and only accessible to authorised personnel.

We do not sell or share personal information with third parties except where required by law.