This document sets out the Anti-Money Laundering (AML), Counter-Terrorist Financing (CTF), and Know Your Customer (KYC) standards applicable to the online service available at dancebetbet.com (the “Website”). The purpose is to protect users, payment partners, and the broader financial system from misuse. This Policy is written for high transparency, reflects a risk-based approach, and aligns with E-E-A-T and YMYL expectations for safety, accuracy, and accountability. 🔐
Last updated: 25 October 2025
1) Scope and Applicability
This Policy applies to all visitors, registered account holders, employees, contractors, and third-party service providers engaged by the Website (collectively, “Users” where context allows). Where the Website is not permitted by local law, access is prohibited. The Company reserves the right to amend this Policy to reflect evolving regulations, industry guidance, and supervisory expectations.
2) Legal and Regulatory Framework
The Website adopts a principles-based compliance program informed by leading international standards, including:
- FATF Recommendations (Financial Action Task Force) on AML/CTF and risk-based supervision.
- EU AMLD suite, including Directive (EU) 2015/849 (as amended) and Regulation (EU) 2015/847 on wire transfer information.
- Sanctions and lists screening, such as UN consolidated lists and applicable regional/national sanctions regimes.
- Data protection best practices inspired by GDPR principles of lawfulness, fairness, transparency, purpose limitation, and security.
Nothing in this Policy limits compliance with stricter local laws. Where conflicts arise, the stricter requirement prevails. 🚦
3) Definitions
- Money Laundering (ML): Any process of concealing the illicit origin of funds or assets, including conversion, transfer, concealment, acquisition, possession, or use of property, with knowledge of its criminal origin.
- Terrorist Financing (TF): Direct or indirect provision or collection of funds with the intention or knowledge that they be used to carry out terrorist acts or support terrorist organizations.
- KYC/CDD: Know Your Customer/Customer Due Diligence processes to identify, verify, and assess Users.
- EDD: Enhanced Due Diligence, applied when higher risk is detected (e.g., high-value activity, PEP exposure, complex payment behavior).
- PEP: Politically Exposed Person, including close associates and family members.
4) Jurisdictional Access and Prohibited Use
The Website does not solicit or offer services in jurisdictions where online gaming or the use of the Website’s services is illegal. Access is blocked or limited where required. Users are responsible for ensuring that use of the Website is lawful in their country of residence. Any attempt to circumvent geo-blocking, identity controls, or legal constraints is strictly prohibited. 🚫
5) Governance, Roles, and Accountability
- Board/Executive Oversight: Senior management approves the AML/CTF framework, risk appetite, and resources.
- AMLCO: An Anti-Money Laundering Compliance Officer oversees day-to-day program effectiveness, reporting lines, and remediation.
- Three Lines of Defense: 1) Business ownership of risk, 2) Compliance monitoring and advisory, 3) Independent audit.
6) Risk-Based Approach (RBA)
The Company systematically identifies and mitigates risks across customers, products, payment rails, delivery channels, and geographies. Controls scale with risk and are reviewed periodically.
6.1) Customer Risk Segmentation
Customer risk is assessed using a multi-factor model that considers KYC information, PEP/sanctions exposure, transaction velocity, payment methods, and behavioral patterns. Risk classification is dynamic and may change over time.
6.2) Geographic and Sanctions Risk
Countries and regions are categorized into low, medium, and high risk, incorporating sanctions lists, FATF statements, and ML/TF vulnerabilities. Access can be restricted or prohibited for high-risk locations.
7) Customer Due Diligence (CDD/KYC)
The Website employs tiered verification with document authentication, database checks, and liveness or selfie verification where available. Information collected is proportionate to the intended use of the account and applicable thresholds.
7.1) Standard Information Collected
- Full legal name, date of birth, nationality, and gender.
- Residential address, including country of usual residence.
- Valid contact details (email and, where applicable, phone number).
- Government-issued photo ID and a secondary verification measure (e.g., selfie with randomized code).
7.2) Address Verification
Proof of address may be validated via reputable electronic databases. If unavailable or inconclusive, the User can provide a recent utility bill, bank statement, or government correspondence issued within the last 3 months, showing full name and address. All corners and text must be clearly visible.
7.3) Enhanced Due Diligence (EDD)
EDD is triggered by risk indicators such as PEP status, sanctions screening alerts, complex or unusual activity, cross-border patterns, or high value behavior. EDD can include expanded identity verification, Source of Funds (SoF) and Source of Wealth (SoW) checks, and senior management approval.
8) Thresholds and Triggers
Illustrative thresholds guide the depth of verification and monitoring. The Company may adopt stricter thresholds at its discretion or to meet partner and regulatory expectations.
| Tier | Activity Trigger (Illustrative) | Controls |
|---|---|---|
| Tier 1 | Account creation; low activity | Basic KYC (name, DOB, country, email), sanctions/PEP screening, device risk checks |
| Tier 2 | Single or aggregate deposits/withdrawals ≥ USD/EUR 2,000 (or equivalent) | ID document check with selfie/liveness, database verification, address proof if needed |
| Tier 3 | Single or aggregate deposits/withdrawals ≥ USD/EUR 5,000 (or equivalent), or unusual patterns | EDD including SoF/SoW, corroborating documentation, senior-level review, tighter limits |
9) Source of Funds (SoF) & Source of Wealth (SoW)
Where required, Users must evidence the origin of funds or wealth through verifiable documentation. Examples include:
- Recent payslips or employment contracts.
- Business ownership records, company filings, or dividend statements.
- Investment statements, property sale documents.
- Inheritance or gift documentation, tax returns where appropriate.
If sufficient clarity cannot be obtained, activity will be paused or the account restricted pending satisfactory evidence. ⏸️
10) Ongoing Monitoring
Transactions and behaviors are monitored using automated tools and manual oversight to identify anomalies relative to the User profile. Monitoring includes velocity, value, counterparties, payment method switching, device/IP signals, and gaming behavior anomalies such as funding and rapid withdrawal without meaningful session activity.
- Level 1: Pre-transaction checks by payment processors and internal screening.
- Level 2: Real-time and post-event analytics with alerting to compliance staff.
- Level 3: Manual case review for higher-risk Users or patterns; escalation to AMLCO.
11) Suspicious Activity Identification & Reporting
If activity appears inconsistent with the stated purpose of the account, the User’s known profile, or legitimate sources of income, the Company may:
- Request additional KYC/EDD information.
- Restrict functionality, freeze balances, or terminate the relationship where permitted.
- Submit suspicious activity information to competent authorities or Financial Intelligence Units (FIUs), as legally required.
Disclosure obligations to Users may be limited by “tipping-off” restrictions. 🔎
12) Payment Methods and Same-Route Principle
- Where feasible, withdrawals are processed back to the original funding method up to the amount deposited, to reduce ML/TF risk.
- Use of third-party payment instruments is prohibited. The account name and the payment method name must match.
- The Company may block deposits/withdrawals inconsistent with KYC information or risk limits.
13) Cryptocurrency and Virtual Asset Controls
If virtual assets are supported, the Company will apply additional screening such as wallet risk scoring, blockchain analytics, origin-of-funds tracing, and restrictions on high-risk services (e.g., mixers/tumblers, sanctioned exchanges). Transfers from or to sanctioned or high-risk wallets are prohibited.
14) Records Management
- KYC and transaction records are retained securely for at least 10 years after the end of the business relationship or as otherwise required by law.
- Records may be stored in encrypted form on secure infrastructure with role-based access controls and audit logging.
15) Data Protection and Privacy
Personal data is collected for legitimate compliance purposes, processed lawfully, and safeguarded with appropriate technical and organizational measures. Access is limited to personnel with a “need-to-know.” Data may be shared with authorities or partners strictly to meet legal obligations and fraud/AML objectives. 🔒
16) Sanctions, PEP, and Adverse Media Screening
Users are screened at onboarding and periodically thereafter against sanctions and PEP lists, together with adverse media checks proportionate to risk. Matches trigger EDD or denial of service where mandated.
17) Training and Awareness
- Mandatory AML/CTF training is provided to relevant staff at onboarding and refreshed annually.
- Specialized modules cover KYC, EDD, sanctions, red flags, suspicious activity escalation, and data protection.
18) Independent Assurance and Continuous Improvement
- Internal audit and/or qualified third parties periodically assess program design and operational effectiveness.
- Findings are tracked to remediation with deadlines and executive oversight.
19) User Responsibilities
- Provide true, complete, and up-to-date information and promptly notify changes in personal or financial circumstances.
- Use only payment methods in your own name and avoid any third-party funding.
- Avoid VPNs, proxies, device spoofing, or other means to circumvent geo-blocking, age restrictions, or AML/KYC controls.
- Cooperate with additional checks when requested; failure to cooperate can result in restrictions or account closure.
20) Prohibited Activities
- Abuse of promotions or bonus manipulation in a manner indicative of ML/TF or fraud.
- Structuring deposits/withdrawals to avoid thresholds or monitoring.
- Use of shell accounts, mule accounts, or third-party cards/wallets.
- Access from, or transfers to, sanctioned jurisdictions or persons.
21) Enterprise-Wide Risk Assessment (EWRA)
An enterprise-wide risk assessment is conducted at least annually to evaluate inherent and residual AML/CTF risks across products, users, geographies, and channels. Control enhancements, staffing, and technology roadmaps are prioritized accordingly. 📊
22) Complaints and Whistleblowing
The Company maintains channels for confidential reporting of suspected AML/CTF breaches by staff or Users. Reports are handled by compliance with appropriate independence and non-retaliation safeguards.
23) Contact
For questions about this AML/CTF & KYC Policy, requests to exercise applicable data rights, or to report suspicious activity:
- Website: dancebetbet.com
- Compliance: [email protected]
- Support: [email protected]
24) Final Provisions
This Policy forms part of the Website’s overall compliance framework and must be read alongside the Terms of Service, Privacy Notice, Cookie Policy, and any jurisdiction-specific disclosures. Where law or a competent authority requires, the Company will share relevant information to prevent financial crime. The Company may, at its discretion, refuse, suspend, or terminate services where AML/CTF concerns arise, even in the absence of definitive evidence, consistent with a prudent, risk-based approach. ✅