Legal

How we operate at Bitcoin ATM KYC, AML, and transaction security

Ismail
Author, Specialist

Bitcoin ATM.com works to ensure that your transactions are secure and your funds are legal. In this guide, we will explain step by step why operators verify users, what information they need, and how the whole process works in practice.

Why do we use AML and what is it?

AML (Anti-Money Laundering) is a set of rules and procedures that protect the financial system from being used for illegal activities such as:

  • laundering of proceeds from crime,
  • terrorist financing,
  • fraud or theft.

Bitcoin ATM operators Bitcoin ATM AML to:

  1. Protecting you and your funds – no one can use your identity to commit fraud.
  2. Ensure the legality of transactions – every exchange or deposit is carried out in accordance with the law.
  3. Protecting the entire system – by counteracting financial crimes, Bitcoin ATM a safe place to exchange cryptocurrencies.

Example:
Imagine that someone is trying to transfer money obtained through fraud. Thanks to AML, such a transaction is stopped and your funds remain safe.

Which procedures actually apply to you?
99% of users only go through the basic steps. Rare procedures are only initiated in exceptional situations.
Who is affected
What is required
Why

1. Why do we identify users?

Imagine someone trying to use your ID or make a transaction on your behalf. We won't let that happen. That's why operators require identity verification for larger transactions at Bitcoin ATM.

What this means in practice:

  • You can use Bitomat without scanning your document up to a certain limit.
  • If you want to make a transaction above this limit, the ATM operator will ask you for a scan of your ID.
  • We then check whether the document is valid and belongs to you.
  • This keeps your funds safe and protects you from identity theft attempts.

Example:
Janek comes to Bitomat and wants to exchange 200 euros for cryptocurrencies. The amount is within the limit, so the transaction proceeds automatically.
A few days later, he returns and wants to exchange 1,500 euros. This time, the Bitomat operator asks him to scan his ID—the procedure is quick and takes a few seconds, and Janek can continue the transaction without contacting the staff.

2. Transaction limits and contacting customer service

Each user of Bitomat has a specific transaction limit up to which they can operate completely independently.
We do not require any additional documents for this limit other than a scan of your ID if the transaction exceeds the identity verification threshold.

If the transaction amount exceeds the KYC limit, the Bitomat Operator will ask you to scan your ID.
In some cases, we will need additional documents, such as proof of funds (PoF).

Example:
Janek exchanges €200—this is within the basic limit, so the transaction is processed automatically without scanning any documents.
A few days later, he wants to exchange €1,500—this amount exceeds the KYC limit, so the Bitomat operator asks him to quickly scan his ID.
Janek then plans a transaction for €25,000. The ATM operator will ask him to contact customer service and send, for example, a bank statement confirming the source of the funds.

Examples of documents that the Operator may ask you for:

  • bank statements or account history,
  • employment contracts or contracts of mandate,
  • tax documents, e.g., PIT, if the funds come from remuneration or business activity,
  • notarial deeds, if the funds come from the sale of assets or real estate,
  • transaction history from your cryptocurrency wallet, confirmation of previous purchases/sales at Bitcoin ATM, proof of mining activity, proof of transactions from cryptocurrency exchanges (applies to cryptocurrency sales).

Thanks to these documents, the ATM operator can ensure that the funds come from a legal source and that the transaction is secure—both for you and for the entire system. 

If the documents you send raise questions for the Operator or are incomplete, you may be asked for additional explanations. This may involve, for example, clarifying where the funds come from or sending an additional document.

If you are unable to explain this or refuse to cooperate, the transaction will be marked as high risk and cannot be completed. We do this not to make your life difficult, but to protect you and the entire system from fraud and illegal activities.

3. Checking sanctions lists and PEPs

In accordance with the regulations, we check:

  • whether someone appears on the sanctions lists,
  • whether the user is a politically exposed person (PEP – persons holding political or public office).

Why:
This protects Bitcoin ATM money laundering and terrorist financing.

Example:

Maria attempts to make a transaction, but the system detects that she is a PEP. We will ask her for additional documents and management approval before the transaction can be completed.

4. Large or unusual transactions

If the transaction amount is high or the user's behavior appears unusual, we apply Enhanced Due Diligence (EDD).

Example:

Tom regularly deposits small amounts, but suddenly comes in with a large deposit. The Bitomat operator will ask Tom to explain the source of the money, e.g., by sending a bank statement. In certain cases, the operator will ask for a written statement that he is acting on his own behalf.

This allows us to protect all users and the entire system.

5. Transactions only for the owner of the ID

The Bitcoin ATM operator only Bitcoin ATM for the person who comes to the device. You cannot make transactions on behalf of other people.

Example:

Someone is attempting to deposit funds using your ID – the transaction will be declined.

If we suspect fraud, we may request additional information or documents. If the transaction is not successfully verified, we may, in accordance with the Terms and Conditions, charge a commission to cover the costs of the verification.

6. Data protection

Your data is secure:

  • Documents and recordings are stored in accordance with the GDPR.
  • We do not share them with anyone without a legal requirement.

Example:

Janek is concerned that his data may be leaked – we assure him that it is encrypted and stored only for as long as required by law.

7. Contact Customer Service - if you have any additional questions

If you have any questions, concerns or problems during the verification process, we encourage you to contact our Customer Service Department

8. Summary in practice

  1. You approach the ATM → select the transaction amount.
  2. If the transaction falls within the basic limit → you execute it immediately, without scanning the document.
  3. If the amount exceeds the identification limit (KYC) → The ATM operator will ask you to scan your ID, and after verification, you can continue.
  4. If other circumstances apply (e.g., a very high transaction amount or the customer is a PEP), it may be necessary to contact customer service and submit additional documents, such as a source of funds (SoF) confirmation.

All this to ensure that your funds are secure, transactions are legal, and the system is protected against fraudsters.

What happens if a transaction is suspended?
Suspension ≠ loss of funds. It is a controlled security process.
  1. 1
    The system detects a warning signal.

    This could be a large amount of money, a missing document, or unusual behavior.

  2. 2
    The transaction is temporarily suspended.

    The funds do not disappear and are not transferred elsewhere.

  3. 3
    Contact or request for clarification

    The operator may ask for a document or brief clarification.

  4. 4
    Decision and finalization

    After positive verification, the transaction is executed or canceled in accordance with the terms and conditions.

This mechanism protects you from errors, fraud, and situations in which someone could act to your detriment.

Other blogs