Platform / Compliance stack

Compliance, documented and delegable.

OVAAL's compliance stack executes Travel Rule messaging (Notabene or 21 Analytics), AML screening (Chainalysis or TRM Labs), sanctions checks, and MiCA-aligned stablecoin defaults (USDC, EURC) inline in every transfer. Partner policy defines thresholds and tolerances. OVAAL enforces them automatically. Everything is instrumented, logged, and exportable for your auditor or regulator.

The compliance surface.

ComponentWhat it doesProvider options
Travel Rule messagingEU TFR Art. 14 data exchange for transfers above €1,000 thresholdNotabene, 21 Analytics (partner-chosen)
AML transaction screeningKYT + sanctions + risk-category scoringChainalysis, TRM Labs (partner-chosen)
Address screeningPre-transfer destination check against sanctions + mixer + darknet clustersChainalysis, TRM Labs
Stablecoin defaultsUSDC + EURC as MiCA-compliant EMTsCircle Internet Financial Europe
EMI partner railsSEPA Instant payoutsModulr, Banking Circle, Clear Junction, Paynetics
Audit-log exportSigned JSON/CSV, queryable by transaction/user/rule/timeOVAAL-native
Incident responseJoint runbook per partnerOVAAL + partner on-call

Responsibility split.

Where partner's license meets OVAAL's stack.

ResponsibilityPartnerOVAAL
CASP / EMI / VARA / CBB license
End-user KYC + KYB
Source-of-funds policy✅ (defines)Executes against partner's policy
Transaction screening (KYT + sanctions)Partner sets thresholdsIntegrated provider executes
Travel Rule messagingPartner's policy per jurisdictionIntegration handles exchange
Custody of end-user fundsN/A — non-custodialN/A — non-custodial
Breach notification to regulatorsSupports with incident data

Partner compliance pack on request.

DPA template, sub-processor list, legal opinions, security posture, audit-log export sample, joint incident playbook, and MSA template.