Anti-Money Laundering (AML) & Counter-Terrorist Financing (CTF) Policy

This document sets out the Anti-Money Laundering (AML), Counter-Terrorist Financing (CTF), and Know Your Customer (KYC) standards applicable to the online service available at dancebetbet.com (the “Website”). The purpose is to protect users, payment partners, and the broader financial system from misuse. This Policy is written for high transparency, reflects a risk-based approach, and aligns with E-E-A-T and YMYL expectations for safety, accuracy, and accountability. 🔐

1) Scope and Applicability

This Policy applies to all visitors, registered account holders, employees, contractors, and third-party service providers engaged by the Website (collectively, “Users” where context allows). Where the Website is not permitted by local law, access is prohibited. The Company reserves the right to amend this Policy to reflect evolving regulations, industry guidance, and supervisory expectations.

2) Legal and Regulatory Framework

3) Definitions

4) Jurisdictional Access and Prohibited Use

The Website does not solicit or offer services in jurisdictions where online gaming or the use of the Website’s services is illegal. Access is blocked or limited where required. Users are responsible for ensuring that use of the Website is lawful in their country of residence. Any attempt to circumvent geo-blocking, identity controls, or legal constraints is strictly prohibited. 🚫

5) Governance, Roles, and Accountability

6) Risk-Based Approach (RBA)

The Company systematically identifies and mitigates risks across customers, products, payment rails, delivery channels, and geographies. Controls scale with risk and are reviewed periodically.

6.1) Customer Risk Segmentation

Customer risk is assessed using a multi-factor model that considers KYC information, PEP/sanctions exposure, transaction velocity, payment methods, and behavioral patterns. Risk classification is dynamic and may change over time.

6.2) Geographic and Sanctions Risk

Countries and regions are categorized into low, medium, and high risk, incorporating sanctions lists, FATF statements, and ML/TF vulnerabilities. Access can be restricted or prohibited for high-risk locations.

7) Customer Due Diligence (CDD/KYC)

The Website employs tiered verification with document authentication, database checks, and liveness or selfie verification where available. Information collected is proportionate to the intended use of the account and applicable thresholds.

7.1) Standard Information Collected

7.2) Address Verification

Proof of address may be validated via reputable electronic databases. If unavailable or inconclusive, the User can provide a recent utility bill, bank statement, or government correspondence issued within the last 3 months, showing full name and address. All corners and text must be clearly visible.

7.3) Enhanced Due Diligence (EDD)

EDD is triggered by risk indicators such as PEP status, sanctions screening alerts, complex or unusual activity, cross-border patterns, or high value behavior. EDD can include expanded identity verification, Source of Funds (SoF) and Source of Wealth (SoW) checks, and senior management approval.

8) Thresholds and Triggers

Illustrative thresholds guide the depth of verification and monitoring. The Company may adopt stricter thresholds at its discretion or to meet partner and regulatory expectations.

9) Source of Funds (SoF) & Source of Wealth (SoW)

10) Ongoing Monitoring

Transactions and behaviors are monitored using automated tools and manual oversight to identify anomalies relative to the User profile. Monitoring includes velocity, value, counterparties, payment method switching, device/IP signals, and gaming behavior anomalies such as funding and rapid withdrawal without meaningful session activity.

11) Suspicious Activity Identification & Reporting

If activity appears inconsistent with the stated purpose of the account, the User’s known profile, or legitimate sources of income, the Company may:

12) Payment Methods and Same-Route Principle

13) Cryptocurrency and Virtual Asset Controls

If virtual assets are supported, the Company will apply additional screening such as wallet risk scoring, blockchain analytics, origin-of-funds tracing, and restrictions on high-risk services (e.g., mixers/tumblers, sanctioned exchanges). Transfers from or to sanctioned or high-risk wallets are prohibited.

14) Records Management

15) Data Protection and Privacy

Personal data is collected for legitimate compliance purposes, processed lawfully, and safeguarded with appropriate technical and organizational measures. Access is limited to personnel with a “need-to-know.” Data may be shared with authorities or partners strictly to meet legal obligations and fraud/AML objectives. 🔒

16) Sanctions, PEP, and Adverse Media Screening

Users are screened at onboarding and periodically thereafter against sanctions and PEP lists, together with adverse media checks proportionate to risk. Matches trigger EDD or denial of service where mandated.

17) Training and Awareness

18) Independent Assurance and Continuous Improvement

19) User Responsibilities

20) Prohibited Activities

21) Enterprise-Wide Risk Assessment (EWRA)

An enterprise-wide risk assessment is conducted at least annually to evaluate inherent and residual AML/CTF risks across products, users, geographies, and channels. Control enhancements, staffing, and technology roadmaps are prioritized accordingly. 📊

22) Complaints and Whistleblowing

The Company maintains channels for confidential reporting of suspected AML/CTF breaches by staff or Users. Reports are handled by compliance with appropriate independence and non-retaliation safeguards.

23) Contact

24) Final Provisions

This Policy forms part of the Website’s overall compliance framework and must be read alongside the Terms of Service, Privacy Notice, Cookie Policy, and any jurisdiction-specific disclosures. Where law or a competent authority requires, the Company will share relevant information to prevent financial crime. The Company may, at its discretion, refuse, suspend, or terminate services where AML/CTF concerns arise, even in the absence of definitive evidence, consistent with a prudent, risk-based approach. ✅