6ix — KYC / AML & Sanctions

These rules explain how 6ix verifies accounts (KYC/KYB), screens for sanctions and high-risk activity, protects wallets and coins, and works with lawful requests. They help us keep creators, fans, and the financial system safe.

Last updated: 2025-10-28

1) Overview

Why verification matters

KYC (Know Your Customer) and AML (Anti-Money Laundering) controls reduce fraud, protect payouts, and ensure 6ix can operate globally. We tailor checks to risk, applicable law, and product usage.

Scope

Applies to top-ups, coin usage, wallet features, creator payouts, tips, subscriptions, marketplace sales, and any feature where funds move. When partners (e.g., payment processors or custodial wallets) require additional checks, their rules also apply.

2) Who must verify (KYC/KYB)

Individuals (KYC)

  • Payouts enabled or approaching payout thresholds.
  • Wallet activation, withdrawals, or higher top-up limits.
  • Risk signals (e.g., chargebacks, device anomalies, sanctions proximity).
  • Regulatory requirements by country, plan tier, or product.

Businesses (KYB)

Companies may need business verification (KYB): legal entity details, directors/owners (UBOs), registration documents, and authorized representative identity. Additional checks apply for certain industries.

Plan context

Pro and Pro Max users often reach higher limits faster and may be prompted earlier. Star-tick creators are subject to ongoing integrity checks in addition to standard KYC/KYB.

3) Verification process & documents

What we collect

  • Government ID (passport, national ID, or driver’s license).
  • Liveness/selfie and sometimes proof of address (PoA).
  • For KYB: entity records, beneficial ownership, and officer authorization.

How we verify

Verification is performed through secure flows, often via a compliance partner. We check document authenticity, face match, watchlists, and geographic eligibility. Some cases require manual review.

Timing & expiry

Most checks complete within minutes. Periodic re-verification can be required (e.g., expired ID, new jurisdiction, unusual activity). Failure to complete may limit features until resolved.

4) Data security, privacy & retention

Security

KYC data is encrypted in transit and at rest. Access is restricted to vetted personnel and systems needed for compliance. We minimize what we store and prefer vendor-hosted tokens where possible.

Retention

We retain records only as long as required for legal, regulatory, and fraud-prevention purposes, then delete or anonymize. See Privacy — Retention.

Your rights

Regional privacy rights may allow access or deletion requests; some compliance records must be retained per law. See Privacy for details.

5) AML & sanctions controls

Sanctions & watchlists

Lists we screen against

We check relevant global and regional lists (e.g., OFAC, UN, EU, UK HMT) and locally applicable watchlists. A positive sanctions match means we cannot provide service and must restrict accounts or transactions.

False positives & remediation

If you believe a match is incorrect, contact compliance@6ixapp.comwith supporting documents. We cannot serve sanctioned individuals or entities.

PEPs & enhanced due diligence

Politically Exposed Persons

PEPs and close associates/family members can pose higher risk. We may request additional documentation, impose lower limits, or restrict certain features depending on risk and law.

Enhanced checks

Additional steps may include source-of-funds/source-of-wealth information, adverse media review, and periodic re-assessment.

Restricted jurisdictions

Geographic restrictions

Due to sanctions, legal, or risk reasons, some countries/regions are unsupported or limited. Availability can change. If you travel or relocate, we may request re-verification.

IP & residency signals

We may use IP, payment instrument country, and document country to assess eligibility and prevent evasion through proxies or misrepresentation.

6) Wallets, coins & payments

Coins (prepaid credits)

Top-ups & usage

Coins are prepaid credits used for boosts, 6IXAI usage, tips, promotions, and certain digital items. Consumed coins are generally non-refundable; see Refunds — Digital.

Anti-fraud

We may delay crediting or lock coins acquired through suspicious payments until a review is complete (e.g., stolen cards, chargebacks, or payment processor alerts).

Wallet rules & source-of-funds

Custody & partners

Wallets and payout rails may be provided by regulated custodians or processors. Their KYC/KYB and terms apply in addition to these rules. Certain assets or instruments may be unsupported.

Source-of-funds (SoF)

For higher limits, we may request evidence of SoF/SoW (e.g., payslips, invoices, royalty statements). Transactions that lack a legitimate rationale can be declined.

Holds, limits & unlocks

When we place holds

  • Multiple disputed top-ups or unusual refund/chargeback ratios.
  • Rapid coins movement between related accounts (“pass-through”).
  • Jurisdiction mismatches or sanctions proximity.

How to unlock

Complete any pending KYC/KYB, provide requested documents, and address processor alerts. We may step-down limits gradually once risk decreases.

7) Monitoring & suspicious activity

Signals & patterns we review

Examples

  • Account networks with shared devices/IPs funding each other.
  • Routed payments through high-risk PSPs or anonymization services.
  • Unusual bursts of top-ups and withdrawals with minimal creator activity.

Context matters

Legitimate bursts (e.g., viral success) are common on 6ix. We consider creator history, geography, audience patterns, and platform signals to avoid false positives.

What we may do

Account-level

  • Temporary limits (top-up, spend, or withdrawal caps).
  • Coins or payout holds pending review.
  • Feature restrictions or account suspension for severe cases.

Transaction-level

Decline or reverse suspicious transactions; claw back benefits (e.g., boosts) where funded by fraudulent instruments; notify processors/partners as needed.

Regulatory reporting

STR/SAR & obligations

Where required by law or our partners’ obligations, we may file Suspicious Transaction/Activity Reports. To protect investigations, we typically cannot notify users about such filings.

Cooperation

We cooperate with competent authorities under valid legal process. See Law Enforcement Guidelines.

8) Appeals & re-verification

If you’re declined or limited

You can appeal in-product or email compliance@6ixapp.com. Provide accurate info and any supporting documents (e.g., updated ID, proof of address, SoF). Some outcomes are dictated by law or partner requirements and cannot be overridden.

Periodic checks

We may ask you to renew verification or provide updated entity information—especially after material changes (ownership, country, name) or risk signals.

9) Creator responsibilities

Be truthful

Provide accurate information and only your own documents. Misrepresentation or forged docs will result in account action and potential law-enforcement referral.

Use funds lawfully

Earnings, tips, and top-ups must come from lawful sources and lawful activities on 6ix. Follow tax rules in your country and keep your details current.

No evasion

Do not attempt to bypass limits by opening duplicate or straw accounts. This results in consolidated limits or termination across the account network.

10) Third-party providers

Compliance vendors

We use reputable KYC/KYB and sanctions screening vendors. Their privacy and security controls are part of our vendor due-diligence program.

Processors & custodians

Payment processors and custodians may require additional checks or impose regional restrictions. Their terms and policies apply alongside this one.

11) Law enforcement & legal process

Valid process

We respond to valid legal process and emergencies consistent with law. See Law Enforcement Guidelines.

User notice

We notify users where legally permitted and safe to do so; gag orders or safety risks may delay notice. See Privacy — Law enforcement.

12) How this interacts with other policies

Billing & Subscriptions

See /legal/billing for payment methods, renewals, and limits.

Refunds & Cancellations

See /legal/refunds for eligibility and timelines.

Disputes & Chargebacks

See /legal/disputes for evidence, outcomes, and coins clawback.

Acceptable Use

See /legal/acceptable-use for platform rules and restrictions.

Security

See /legal/security for account and data protection.

Privacy

See /legal/privacy for data practices, rights, and retention.

13) FAQ

Why was my withdrawal paused?

Likely pending verification or due to a risk alert. Check notifications and email compliance@6ixapp.com if you need help.

Can I use a friend’s card to top up?

No. Use your own approved payment instruments. Third-party funding is a common fraud vector and will be declined.

Will being a PEP block my account?

Not necessarily. It triggers enhanced due diligence. Depending on risk and law, certain features/limits may apply.