Compliance and Security
At Glimmer Finance, ensuring compliance with global regulatory standards and maintaining the security of our users and platform is a top priority. By adhering to robust Know Your Customer (KYC) and Anti-Money Laundering (AML) protocols, Glimmer Finance provides a secure and trusted environment for all participants while preventing fraud, money laundering, and other illicit activities.
KYC/AML Requirements
To meet these standards, Glimmer Finance has partnered with Parallel Markets, a trusted KYC/AML provider. Their advanced technology ensures fast, accurate, and secure identity verification for users and asset owners, while adhering to local and international regulations.
For Users
Identity Verification:
Users must submit government-issued identification (e.g., passport or driver’s license) to confirm their identity.
Parallel Markets’ system automatically validates these documents to streamline the process.
Proof of Address:
Users are required to submit proof of residence, such as a utility bill or bank statement, to verify their location.
Ongoing Monitoring:
KYC processes are not one-time events. Parallel Markets continuously monitors accounts for any suspicious activity or red flags, ensuring the prevention of fraud or illegal practices.
Compliance with AML Laws:
The platform adheres to anti-money laundering regulations by tracking the source of funds and ensuring that only legitimate financial activities occur.
For Asset Owners
Enhanced Due Diligence:
Asset owners undergo additional verification to validate ownership and ensure the tokenized asset complies with local laws.
Asset Documentation:
Proof of asset ownership, such as title deeds or legal certificates, and official valuations must be submitted before tokenization.
Why Compliance and Security Matter
Fraud Prevention: Robust KYC/AML checks minimize the risk of fraudulent activity, ensuring a secure marketplace.
Global Regulatory Adherence: Glimmer Finance complies with both local and international laws, building trust with users and regulators.
Secure Data Handling: All data collected during the verification process is handled securely, ensuring user privacy and compliance with data protection standards.
Last updated