Digital assets like crypto currencies, Tokens and digital units, have been part of our lives for the past eleven years and since then the industry has been developing with rapid speed. With over 3000 crypto currencies, Digital tokens and digital assets available currently, there are both amazing opportunities for innovation, but there are also cases hinting that, in general, crypto currencies and digital tokens are also uniquely suited to facilitate dubious behavior.
Regulatory challenges related to cryptocurrencies are mainly linked to the anonymity of transactions and the decentralization of financial dealings. The authorities' goal is to prevent the possibility of using cryptocurrencies and other Digital assets as a means for criminal activity.
Considering the fact that each digital Token, cryptocurrency, digital units has unique traits, Crypto Bridge Africa believes that every cryptocurrency and Token on the market should be assessed and audited by regulators based on its unique traits to enable the provisions of Digital taxation.
To prevent individuals from engaging in criminal and unwanted behavior, CryptoBridge Africa monitors its clients and implements rules aligned with the legal development. For example, to prevent money laundering and misuse of its Token, identity theft, financial fraud and terrorist financing, Crypto Bridge Africa within its database, has implemented KYC (know-your-customer) rules and Ant-Money Laundering Policy in relation with the Online Transaction act 2001, thus disrupting any possible misconduct by its users and all our clients.
By requesting personal documentation that proves the identity of each user, CBA makes sure that each transfer made using the protocol is not anonymous. Since global business opportunities demand a sophisticated international customer identification and verification solution, the KYC policy adopted by CBA database includes identifying the user and verifying the identity by examining reliable and independent documents. And by dealing with other digital assets that use a KYC protocol for easy tracing in case of any arise criminality during any transaction. All submitted documents of identity remain confidential. Each user must go through a verification procedure every time his or her identity information is changed.
The KYC information requested includes Full names registered on the national identity card, residential address and date of birth/country, as provided to CBA upon account registration and any transaction performed and all this is recorded and stored on our database for easy monitoring in case of anything.
CryptoBridge Africa Company has internal, independent auditors. The objectives of the audit are to assess the consistency of our database and to verify that no transactions outside of the company database. This proves that all existing transactions are included in the database and are consistent.
The procedure of verifying the transactions requires that a number of automated tests are performed in order to comply with the objectives. The first procedure has to prove that all transactions are included in the database and no transactions are made outside of the company database. The second procedure has to prove that the database is consistent, meaning that each transaction's inputs and outputs correspond and could be tracked back to the very first transaction.
The procedure of verifying the database has been designed to confirm that all transactions are consistent, i.e. that each transaction follows a previous one and that there are no errors in the transaction sequence. Secondly, the database must contain the transactions validated in the tests from the previous paragraphs.