Your gateway to crypto world

KYC & Transaction Limits

At Yiksi, we prioritize security and compliance to ensure a safe and seamless experience for all users. Completing your Know Your Customer (KYC) verification allows you to access higher transaction limits and additional features while keeping your account secure.

KYC & Transaction Limits

At Yiksi, we prioritize security and compliance to ensure a safe and seamless experience for all users. Completing your Know Your Customer (KYC) verification allows you to access higher transaction limits and additional features while keeping your account secure.

KYC Verification Requirements

KYC Tier 01 Verification

KYC Tier 01

Transaction Limit

Type Currency Daily Monthly
Deposit
Fiat
1,000
30,000
Withdraw
Fiat
100
3,000
Deposit
Crypto
Unlimited
Unlimited
withdraw
Crypto
500
15,000

Requirements

KYC Tier 02 Verification

KYC Tier 02

Transaction Limit

Type Currency Daily Monthly
Deposit
Fita
25,000
750,000
Withdraw
Fiat
25,000
750,0000
Deposit
Crypto
Unlimited
Unlimited
withdraw
Crypto
1,000000
30,000000

Onboarding KYC

Personal Info

Required Info

Document Verification

Required Document just One

Liveness Check

Face ID

KYCTier 03 Verification

KYC Tier 03

Transaction Limit

Type Currency Daily Monthly
Deposit
Fiat
50,000
1,500,000
Withdraw
Fiat
50,000
1,500,000
Deposit
Crypto
Unlimited
Unlimited
withdraw
Crypto
2,000,000
60,000,000

Required  just One 

Introduction

YIKSI Anti-Money Laundering/ Combating the Financing of Terrorism/ Countering Proliferation Financing and Know Your Customer Policy (hereinafter – the “AML/CFT/CPF/KYC Policy”) is designated to prevent and mitigate possible risks of YIKSI being involved in any kind of illegal activity.

Both international and local regulations require YIKSI to implement effective internal procedures and mechanisms to prevent money laundering, terrorist financing, drug and human trafficking, proliferation of weapons of mass destruction, corruption and bribery and to act in case of any form of suspicious activity from its Users.

Our AML/CFT/CPF/KYC Policy covers the following matters:

  • Verification procedures.
  • Sanctions and PEP lists screening.
  • Compliance Officer.
  • Monitoring Transactions.
  • Risk Assessment.
  • Account Deletion

1 Verification procedures

One of the international standards for preventing illegal activity is customer due diligence (“CDD”). According to CDD, YIKSI establishes its own verification procedures within the standards of Anti-Money Laundering/ Combating the Financing of Terrorism/ Countering Proliferation Financing and Know Your Customer frameworks.

1.1 Identity verification

One of the international standards for preventing illegal activity is customer due diligence (“CDD”). According to CDD, YIKSI establishes its own verification

YIKSI’s identity verification procedure requires the User to provide YIKSI with reliable, independent source documents, data or information (e.g., national ID, passport, face, bank address proof, business certificate). For such purposes YIKSI reserves the right to collect User’s identification information for the AML/CFT/CPF/KYC Policy purposes.

YIKSI will take steps to confirm the authenticity of documents and information provided by the Users. All legal methods for double-checking identification information will be used and YIKSI reserves the right to investigate certain Users who have been determined to be risky or suspicious.

YIKSI reserves the right to verify User’s identity on an on-going basis, especially when their identification information has been changed, or their activity seemed to be suspicious (unusual for the particular User). In addition, YIKSI reserves the right to request up-to-date documents from the Users, even though they have passed identity verification in the past.

User’s identification information will be collected, stored, shared and protected strictly in accordance with the YIKSI’s Privacy Policy and related regulations.

Once the User’s identity has been verified, YIKSI is able to remove itself from potential legal liability in a situation where its Services are used to conduct illegal activityprocedures within the standards of Anti-Money Laundering/ Combating the Financing of Terrorism/ Countering Proliferation Financing and Know Your Customer frameworks.

1.2 Mobile Wallet and Card verification

The Users who are intended to use mobile wallets and payment cards in connection with the YIKSI’s Services have to pass verification in accordance with instructions available on the YIKSI’s Site.

2 Sanctions and PEP lists screening.

YIKSI screens applicants against recognized Sanctions and Politically Exposed Persons (PEPs) lists. Individuals and legal entities are screened against mentioned lists:

  1. At on the onboarding stage when the user is submitting the application.
  2. on each anti-fraud and AML alerts manually by Compliance Officer.
  3. monthly by running automatically with a script to re-check all data base of customers.
  4. For the screening process performing YIKSI uses multiple integrated data sources for manual confirmation.

3 Compliance Officer

The Compliance Officer is the person, duly authorized by YIKSI, whose duty is to ensure the effective implementation and enforcement of the AML/CFT/CPF/KYC Policy. It is the Compliance Officer’s responsibility to supervise all aspects of YIKSI’s Anti-Money Laundering/ Combating the Financing of Terrorism/ Countering Proliferation Financing and Know Your Customer, including but not limited to:

  1. Collecting Users’ identification information.
  2. Establishing and updating internal policies and procedures for the completion, review, submission and retention of all reports and records required under the applicable laws and regulations.
  3. Monitoring transactions and investigating any significant deviations from normal activity.
  4. Implementing a records management system for appropriate storage and retrieval of documents, files, forms and logs.
  5. Updating risk assessment regularly.
  6. Providing law enforcement with information as required under the applicable laws and regulations.

The Compliance Officer is entitled to interact with law enforcement, which are involved in prevention of money laundering, terrorist financing and other illegal activity.

4 Monitoring Transactions

The Users are known not only by verifying their identity (who they are) but, more importantly, by analyzing their transactional patterns (what they do). Therefore, YIKSI relies on data analysis as a risk-assessment and suspicion detection tool. YIKSI performs a variety of compliance-related tasks, including capturing data, filtering, record-keeping, investigation management, and reporting. System functionalities include:

  1. Daily check of Users against recognized “blacklists” (e.g. OFAC), aggregating transfers by multiple data points, placing Users on watch and service denial lists, opening cases for investigation where needed, sending internal communications and filling out statutory reports, if applicable.
  2. Case and document management.

    Regarding the AML/CFT/CPF/KYC Policy, YIKSI will monitor all transactions, and it reserves the right to:

    1. Ensure that transactions of suspicious nature are reported to the proper law enforcement through the Compliance Officer.
    2. Request the User to provide any additional information and documents in case of suspicious transactions.
    3. Suspend or terminate User’s Account when YIKSI has reasonably suspicion that such User engaged in illegal activity.

    The above list is not exhaustive, and the Compliance Officer will monitor Users’ transactions on a day-to-day basis to define whether such transactions are to be reported and treated as suspicious or are to be treated as bona fide.

5 Risk Assessment

YIKSI, in line with the international requirements, has adopted a risk-based approach to combating money laundering and terrorist financing. By adopting a risk-based approach, YIKSI is able to ensure that measures to prevent or mitigate money laundering and terrorist financing are commensurate to the identified risks. This will allow resources to be allocated in the most efficient ways. The principle is that resources should be directed in accordance with priorities so that the greatest risks receive the highest attention.

6 Account Deletion

The nature of Yiksi business is to facilitate payments from our systems to users and transactions between our users, for such reason we are required to comply with AML/CFT/CPF/KYC guidelines which state we must have a record of the parties involved in transactions through our system.

You may request to delete your account at any time by contacting Customer Support or using the account delete feature provided. However, due to the nature of the business and the strict rules that we are required to follow in Kenya, and other regions we offer our services, even after deleting your account, we will retain certain data and records associated with your account.

Such retained data will be handled in accordance with our Privacy Policy and applicable data protection laws.

 

Scroll to Top