Live Markets

Anti-Money Laundering Policy at Bitxmax.com

Our AML and CTF framework is designed to detect, deter, and report illicit activity while enabling secure, compliant access to digital assets worldwide.

Our AML mission

Bitxmax.com implements a risk-based Anti-Money Laundering and Counter-Terrorist Financing program aligned to global standards. Our controls aim to help prevent misuse of digital assets while preserving fair access for legitimate users.

Core pillars

Governance
Board-approved policy, senior oversight, and an independent compliance function.
KYC & CDD
Identity verification, beneficial ownership checks, and enhanced due diligence for higher-risk cases.
Sanctions
Robust screening to restrict access for sanctioned entities and individuals.
Monitoring
Automated transaction surveillance with risk rules and on-chain analytics workflows.
Reporting
Suspicious activity reporting to relevant authorities and structured recordkeeping.
Training
Regular staff education, testing, and culture of compliance.
Reminder: Access to certain products (e.g., Margin, Futures) may be restricted based on your jurisdiction, KYC level, and ongoing sanctions screening outcomes. Please review our Risk Disclosure and Terms of Service.

Know Your Customer program

Our KYC program verifies user identities using reliable documents and data sources, helps determine beneficial ownership, and assigns risk tiers that inform product access and monitoring intensity.

Identification and verification

  • Government-issued ID and biometric checks where applicable.
  • Proof of address validation for residency and risk segmentation.
  • Non-face-to-face registration controls to mitigate impersonation risks.
Tip: Visit our Help Center for acceptable document formats and region-specific requirements.

Enhanced due diligence

For higher-risk users and counterparties, we perform deeper checks, source-of-funds/source-of-wealth assessments, and impose tailored limits or restrictions where warranted.

Ongoing due diligence

We refresh KYC data periodically and whenever risk triggers occur, such as unusual activity patterns or adverse media hits.

Transaction monitoring and surveillance

We apply automated rules, thresholds, and behavioral analytics to flag unusual or potentially suspicious activity across fiat and crypto flows.

Risk signals we evaluate

  • Rapid in-and-out transfers without economic purpose.
  • Structuring to avoid thresholds or identity verification.
  • Links to known illicit services, mixers, or darknet entities.
  • Geolocation anomalies or jurisdictional arbitrage patterns.
  • Unusual counterparties or transaction spikes inconsistent with profile.

Example alerts

Category Trigger Action
Structuring Multiple deposits just under KYC limit within 24h Enhanced review and temporary limit
High-risk link Outbound to flagged address cluster Block and escalate to compliance
Velocity Unusual withdrawal frequency vs. user baseline Secondary authentication and risk review
Outcome: Alerts route to compliance analysts who review context, perform investigations, and record decisions for auditability.

Sanctions screening

We screen users and transactions against applicable sanctions and watchlists. Restricted parties are denied access to products and services.

Scope and lists

Our screening programs are designed to check against international and local sanctions lists and watchlists, updated on a regular cadence.

Blocking and reporting

If a match is confirmed, we restrict services, preserve records, and report to relevant authorities when required.

Risk-based approach

We tailor controls proportionally to assessed risks based on products, geographies, user types, and activity patterns.

Risk factors

  • Jurisdictional exposure and regulatory expectations.
  • Product complexity and leverage risks.
  • User profile and purpose of account.
  • Counterparty risk and on-chain heuristics.

Controls mapping

  • Tiered KYC requirements and transaction limits.
  • Dynamic monitoring thresholds and review frequencies.
  • Manual case reviews and escalation paths.
  • Jurisdiction-based restrictions and geofencing.

Reporting and recordkeeping

We maintain audit-ready records of KYC, monitoring alerts, investigations, and required filings, retained for statutory periods where applicable.

Our approach to reporting

  1. Suspicious activity: Escalations are documented, reviewed, and reported as required by law.
  2. Regulatory engagement: We cooperate with lawful requests and preserve data integrity.
  3. Privacy: We protect personal data in line with legal obligations and security guidelines.
Need help?
Submit a ticket or explore our Help Center for AML/KYC questions.
Help Center Submit a Ticket

Governance and oversight

Our AML framework is overseen by senior management and reviewed periodically to ensure it remains effective and aligned with regulations.

Board and management

Policies are board-approved and implemented across departments with clear lines of responsibility and accountability.

Independent review

We schedule independent assessments and audits of the AML program to identify improvements and confirm control effectiveness.

Training and culture of compliance

Employees receive role-based training, periodic refreshers, and scenario-based exercises to sustain a strong compliance culture.

Curriculum topics

  • Recognizing red flags and escalation protocols.
  • Sanctions and restricted jurisdictions.
  • KYC/EDD practices and data protection.
  • Product-specific risks and controls.

Testing and attestation

We assess knowledge with quizzes and require attestations to verify training completion and comprehension.

Market spotlight

Real-time spot prices are fetched from public APIs. No numbers here are static or hardcoded.

Top pairs

Pair Last Source
Note: Data refreshes periodically. Differences across APIs reflect market fragmentation and latency.

Quick actions

Explore trading products in a compliant way. Access depends on your KYC level and region.

Open Spot Explore Margin Open Futures Start Earn

Frequently asked questions

Answers to common questions about AML, KYC, sanctions, and your account.

Why do you require KYC?

KYC helps us verify identities, deter illicit activity, and comply with legal obligations so we can safely offer products to our users.

What happens if an alert is raised on my account?

Our team reviews context and may request additional information. In some cases, temporary restrictions apply until the review is complete.

Do you block sanctioned users?

Yes. We screen against applicable sanctions lists. Confirmed matches are restricted and may be reported to authorities as required by law.

How do you keep my data secure?

We apply layered security controls, access restrictions, and compliance with data protection laws to safeguard your information.

Contact compliance

Have AML/KYC questions? Reach out or file a support ticket so our team can assist you.

Get support

For account-specific issues, please use our Help Center or submit a ticket for a secure and trackable response.

Help Center Submit a Ticket

AML policy change log

We periodically update our AML policy to reflect evolving regulations and risk insights.

  • 2025-09: Clarified EDD triggers and added additional sanctions list coverage.
  • 2025-06: Updated monitoring thresholds for new market conditions.
  • 2025-03: Introduced expanded training modules with scenario-based assessments.