Robinhood Expects $30 Million Fine in Cyber, Money-Laundering Probe of Crypto Arm

Robinhood Markets Inc.’s cryptocurrency arm expects to pay a $30 million fine to settle a New York state probe into its cybersecurity and anti-money-laundering practices, the mobile investing firm said in regulatory filings Monday, a sharp increase from an earlier estimate of the potential penalty.

Robinhood said in revised paperwork for a public listing that its crypto unit, Robinhood Crypto LLC, anticipates the payout as part of a proposed deal to end an investigation by financial regulators into allegedly lax security procedures.

“[Robinhood Crypto] and the [New York Department of Financial Services] have reached a settlement in principle with respect to these allegations, subject to final documentation, in connection with which, among other things, [Robinhood Crypto] expects to pay a monetary penalty of $30 million and engage a monitor,” the company said.

Menlo Park, Calif.-based Robinhood first disclosed the investigation earlier this month when it filed paperwork to go public. The company told investors at the time that a proposed settlement with the New York Department of Financial Services would require Robinhood’s crypto brokerage to engage a monitor and pay a fine of at least $10 million.

A spokeswoman for Robinhood declined to comment. An NYDFS representative said the investigation is ongoing and declined to comment further.

In its initial filings to go public, Robinhood said New York regulators alleged “certain deficiencies in our policies and procedures regarding risk assessment, lack of an adequate incident response and business continuity plan, and deficiencies in our application development security.” The company has shared few other details.

NYDFS requires financial firms to have anti-money-laundering programs that include collecting basic customer data, responding to law-enforcement requests and evaluating transactions for risks such as sanction violations. The agency also mandates that companies maintain cyber defenses and contingency plans in the event of a hack.

The original full article can be found at wsj.com

(PHOTO: JAKUB PORZYCKI/ZUMA PRESS)

 

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top