{"version":"1.0","provider_name":"YourAdn","provider_url":"https:\/\/www.youradn.com\/en\/","title":"Risk assessment manual - YourAdn","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"aFkKXsGEbe\"><a href=\"https:\/\/www.youradn.com\/en\/risk-assessment-manual\/\">Risk assessment manual<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.youradn.com\/en\/risk-assessment-manual\/embed\/#?secret=aFkKXsGEbe\" width=\"600\" height=\"338\" title=\"&#8220;Risk assessment manual&#8221; &#8212; YourAdn\" data-secret=\"aFkKXsGEbe\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n<\/script>\n","description":"Risk assessment manual Index Definitions ACL Anti-Corruption Law AFB Applicant for Business AML Anti-Money Laundering AMLR Anti-Money Laundering Regulations AMLCO Anti-Money Laundering Compliance Officer MLRO Anti-Money Laundering Reporting Officer DMLRO Deputy Money Laundering Reporting Officer CDD Customer Due Diligence CFT Combating the Financing of Terrorism EDD Enhanced Due Diligence FRA Financial Reporting Autority FSP Financial Services Provider PEP Politically Exposed Persons KYC Know Your Customer RFB Relevant Financial Business SAR Sospicious Activity Reports The internal control system and risk management The internal control system consists of a set of rules, procedures, and organizational structures designed to ensure the effectiveness and efficiency of business processes, the protection of the value of company assets and the sound management of assets held on behalf of clients, the reliability and integrity of accounting and management information, and compliance with applicable regulations. YOURADN is committed to implementing a comprehensive and efficient internal control system, taking into account the various applicable regulations and the various areas of activity. The control system is structured across multiple levels, each with its own specific responsibilities. Specifically, in addition to the tasks institutionally assigned to the supervisory and control bodies, the following are envisaged: &#8211; Line controls: carried out directly by those who implement a specific activity and by those responsible for supervising it; &#8211; Risk or second-level controls: entrusted to structures other than the operational ones; &#8211; Internal audit activities or third-level controls: delegated to the internal auditing structure. &#8211; Credit Risk: understood as the risk of incurring losses as a result of a deterioration in the creditworthiness, leading to default, of both retail\/corporate customers and institutional counterparties to which YOURADN acts as a creditor in its investment activities, as a result of which the debtor may fail to fulfill its contractual obligations in whole or in part. &#8211; Market Risk: defined as the risk of suffering losses, even significant ones, linked to the unfavorable performance of market variables sensitive to YOURADN&#8217;s investment activities, such as interest rates, exchange rates, stock prices, volatility, and bond spreads. &#8211; Liquidity risk: This generally manifests itself in the form of restrictions on the divestment of assets. More specifically, it is the risk that the financial instrument cannot be bought or sold without a significant reduction\/increase in price due to the potential inability of the market to partially or completely accommodate the transaction. BUSINESS RISK ASSESSMENT Business activity, whether financial or non-financial, is always characterized by a certain degree of risk, arising from the uncertainty surrounding the achievement of corporate objectives and therefore connected to the variability of the company&#8217;s future economic value. Since risk is inherent to a company&#8217;s business, it is essential to establish a Risk Management system within the company to ensure the control and governance of corporate risk. The primary purpose of the Risk Management function is to enable the company to derive lasting benefits from every activity it undertakes, thus contributing to the creation of value for the company and its stakeholders. The purpose of the business risk assessment is to: Identify the main risks faced by the Company in its daily operations, whether financial or customer management (AML-KYC-KYB); Assess the likelihood of each risk impacting the Company; Evaluate the procedures and controls in place to mitigate these risks. From an AML perspective, the primary risk for the Company is the initiation of a business relationship (through the sale or purchase of other cryptocurrencies and cryptographic tokens or otherwise) that leads the Company to become involved in or associated with financial crimes or terrorist activities. The potential negative impact of this risk is significant, both financially and operationally, and could result in reputational damage, loss of customers, regulatory action and fines, and lengthy legal proceedings. There are many ways in which the Company could be involved in or associated with a financial crime, including but not limited to: Receiving payments from the proceeds of crime in the form of fiat currency or other cryptocurrencies; Providing services to known criminals, terrorists, or individuals with suspicious business activities; Allow sanctioned individuals or companies to circumvent asset freezes or other sanctions by allowing the transfer of funds through the Company&#8217;s platform; The purchase of cryptocurrencies and other cryptographic tokens which are then essentially associated with the proceeds of crime; Failure to identify suspicious transactions; Assistance in the circulation of criminal proceeds. The Company&#8217;s compliance program includes an assessment and documentation of the risks associated with money laundering, terrorist financing, and proliferation financing within its business, enabling the Company to focus its resources where they are most needed to manage risks within its acceptance level. 1.1 EVALUATION In carrying out a risk assessment of its business, the Company took into account the elements illustrated in the Guidelines for Virtual Asset Service Providers. A risk-based approach allows us to identify potential risks and direct resources and efforts where the risk is greatest, while reducing requirements where the risk is low. The Company&#8217;s risk assessment captures the following factors: The Company&#8217;s customers, Token holders and commercial relationships of purchase, sale, exchange, crypto to crypto, fiat to crypto, crypto to fiat; These include risks associated with the types of customers who enter into a business relationship with the Company. Examples of customer categories that may indicate a higher risk include politically exposed persons (PEPs), sanctioned individuals or companies, customers whose nature, structure, or relationships make it difficult to identify the ultimate beneficial owner of significant or controlling interests, as well as customers who conduct transactions under unusual circumstances. There is a risk that sanctioned individuals and companies may attempt to use tokens as a means to circumvent currently applicable asset freezing sanctions. The Company will ensure that all token holders or users of the platform developed by the Company are checked against the relevant lists of sanctioned individuals and companies to combat such abuse. Token holders may, in fact, be delegated by sanctioned individuals and companies and may de facto hold them on behalf of persons prohibited from doing so. 2. The Company&#8217;s products","thumbnail_url":"https:\/\/www.youradn.com\/wp-content\/uploads\/2025\/06\/risk.png","thumbnail_width":755,"thumbnail_height":282}