Global Exchange Compliance
Global Exchange is committed to assisting governments combat the threat from money laundering and terrorist financing activities around the world. To that end, we have put in place a compliance regime that incorporates international standards and best practices as well as all relevant requirements of money laundering and counter-terrorist legislation in the jurisdictions in which we do business.
As part of our compliance regime, Global Exchange has prepared and implemented policies and procedures to detect, prevent and report suspicious activities and transactions. Our Compliance team verifies and documents the identity of every client and tracks and maintains detailed records of all transactions. We conduct periodic reviews of the effectiveness of our policies and procedures and provide ongoing compliance training to all our staff.
Global Exchange utilizes Accuity's ComplianceLink for its client and transaction screening measures. ComplianceLink includes a comprehensive and reputable worldwide listing of individuals, politically exposed persons and entities that have been noted on government lists or in news and/or officially documented as being questionable by reason of financial or other unsavory/illicit activities. In addition, to providing an extensive list source, ComplianceLink provides Global Exchange with a "fuzzy logic" search function which enhances Global Exchange's screening capability and ultimately lowers the risk of conducting business with any undesirable persons. Further, ComplianceLink provides a sophisticated case management system which enables Global Exchange to track, escalate and report any hits that may be encountered.
At Global Exchange, we understand that security is a critical component in today's business. We have implemented the very best security controls and features to ensure full confidentiality of your account details and financial transactions. Controls such as firewalls, hosting areas, anti-virus software and encryption levels are utilized to prevent spyware issues and hackers. To learn more, click here.
Fill out the form to download the white paper today!