March 26, 2023
Know Your Customer (KYC) are standards designed to protect organizations against money laundering, terrorism financing, tax evasion, politically exposed persons and other corruption risks.
The meaning of KYC has rapidly evolved over the past decade. Whether there is a need to create an account and identify an individual or allow individuals and businesses to transact, the world we live in has become increasingly complex with a heightened focus on improving the customer experience and reducing friction. These scenarios can expose organizations to significant risk that can lead to reputational, regulatory and/or legal concerns. From strictly defined due diligence in the onboarding phase to meticulous monitoring and reporting demands, businesses can struggle to keep up with the new KYC laws, rising expectations and costs of compliance.
So what should you look for in a modern, global KYC solution?
In the early days of KYC, prescriptive requirements were documented on the expectations of what type of information should be collected and verified as well as what constitutes performing the Customer Identification Process (CIP), Customer Due Diligence (CDD) and Specialized or Enhanced Due Diligence (SpDD or EDD). Processes often relied on collecting a customer’s driver’s license or passport and for the customer to legally attest that the information provided on their application was accurate and complete and did not mislead the reviewer. However, we now live in a world that is driven by e-commerce and online engagements that can facilitate fraudsters creating fake identities or even acting as someone else in an Account Takeover (ATO) scenario.
As a result of this rapidly evolving ecosystem, there are many challenges an organization must overcome to holistically comply with KYC expectations including vetting multiple vendors, navigating operational silos, fractured KYC solutions and increasingly changing regulations that market solutions just can’t keep up with.
An effective KYC solution verifies both individuals and business entities and helps identity sanctions, adverse media and key identifiable traits that would warrant further review of a customer. A comprehensive solution is connected through a single API in a low-code/no-code approach that allows an organization to customize workflows to their needs. In addition to global verification of information collected on an individual or business, the following capabilities signify an enhanced offering that truly identifies the customer your business is engaging with:
Watchlist monitoringWatchlist monitoring is the ability to compare customer and transaction details against up-to-date lists of sanctioned parties and other government watch lists. Conducting business with individuals or organizations that are on sanctioned lists and deemed hostile to the United States can create exposure to significant fines that impact a business’s bottom line and reputation.
Watchlist monitoring should be driven by algorithms and forensic analytics, providing better detection. It is imperative to have a clear, consistent methodology behind sanctions due diligence and watchlist programs, enabling businesses to:
A critical aspect of ensuring customers are who they say they are is verifying the documents they present. Identity verification in a KYC solution should include:
Some of the newest and most effective technologies in verifying your customers’ identity are biometric capture and tokenization. These technologies help prove the individual requesting services is truly the applicant, especially where the customer is providing information over an app-based application. Key functionality includes:
Device profiling gathers information on device types, operating systems, location and a wealth of other key metrics that can prove useful in verifying that your customer is the true owner of the device they are using to apply for services. Important considerations for KYC device profiling include:
As technology, regulations and best practices in the KYC arena continue evolve, it is critical for organizations to effectively evaluate solutions that mitigate their risk and protect their ecosystem in a thoughtful way.