<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	 xmlns:media="http://search.yahoo.com/mrss/" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" >

<channel>
	<title>Veriff</title>
	<atom:link href="https://www.veriff.com/blog/kyc-ec-type/kyc-learn/feed" rel="self" type="application/rss+xml" />
	<link>https://www.veriff.com</link>
	<description></description>
	<lastBuildDate>Tue, 09 Dec 2025 08:11:31 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9</generator>
	<itunes:subtitle>Veriff</itunes:subtitle>
	<itunes:summary></itunes:summary>
	<itunes:explicit>false</itunes:explicit>
	<item>
		<title>Key insights from the Marketplace Risk Global Summit 2025</title>
		<link>https://www.veriff.com/kyc/learn/key-insights-from-the-marketplace-risk-global-summit-2025</link>
		
		<dc:creator><![CDATA[agustina.bustinduy@veriff.net]]></dc:creator>
		<pubDate>Fri, 28 Nov 2025 15:56:13 +0000</pubDate>
				<guid isPermaLink="false">https://www.veriff.com/?post_type=kyc-article&#038;p=35797</guid>

					<description><![CDATA[<p>Event overview: A forum for collaboration The Marketplace Risk Global Summit 2025 featured a packed agenda with three simultaneous tracks, offering attendees a variety of panel discussions and presentations. While the event drew a European audience, the themes were globally relevant. A wide array of marketplace sub-sectors were represented, highlighting the universal nature of the</p>
<p>The post <a rel="nofollow" href="https://www.veriff.com/kyc/learn/key-insights-from-the-marketplace-risk-global-summit-2025">Key insights from the Marketplace Risk Global Summit 2025</a> appeared first on <a rel="nofollow" href="https://www.veriff.com">Veriff</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p></p>



<h2 class="wp-block-heading">Event overview: A forum for collaboration</h2>



<p>The <a href="https://www.marketplacerisk.com/event-details-ajw2u/marketplace-risk-global-summit-2025-mrgs25" target="_blank" rel="noopener">Marketplace Risk Global Summit 2025</a> featured a packed agenda with three simultaneous tracks, offering attendees a variety of panel discussions and presentations.</p>



<p>While the event drew a European audience, the themes were globally relevant. A wide array of marketplace sub-sectors were represented, highlighting the universal nature of the risks discussed.</p>



<h2 class="wp-block-heading">Core themes: Trust, fraud, and collaboration</h2>



<p>Several recurring themes anchored the conversations throughout the summit. These topics reflect the primary challenges and opportunities for marketplaces today.</p>



<ul class="wp-block-list">
<li><strong>Safeguarding and trust:</strong> Building and maintaining user trust is more critical than ever. This goes beyond simple compliance to encompass proactive safety measures and clear, consistent policies.</li>



<li><strong>The evolution of fraud:</strong> As technology advances, so do the methods of fraudsters. The discussions emphasized that fraud is a dynamic threat, requiring constant adaptation and sophisticated multi-layered defenses.</li>



<li><strong>Data sharing and collaboration:</strong> A powerful message emerged: no single organization can fight fraud alone. Cross-sector collaboration and secure data sharing are essential to staying ahead of bad actors.</li>



<li><strong>Balancing friction and security:</strong> Marketplaces must find the right equilibrium between robust fraud controls and a smooth user experience. Too much friction can deter genuine users, while too little can invite abuse.</li>



<li><strong>The role of AI:</strong> While &#8220;AI&#8221; was a prominent buzzword, many speakers stressed that the focus should be on practical application. The consensus leaned toward a model where AI supports human decision-making, rather than replacing it, automating predictable tasks to free moderators for higher-value work.<br><br></li>
</ul>



<section class="general-section promo-card block-content alignfull   size-default heading-white text-white" style="background:#03282C no-repeat; text-align: left !important; margin-top: 0px; margin-bottom: 0px; padding: 50px 0 50px;" id="block_1af3cc23456115dae2f43b2e1e721efa">
            <figure class="icon-left-top-col">
        <img decoding="async" src="https://spcdn.shortpixel.ai/spio/ret_img,q_cdnize,to_webp,s_webp/www.veriff.com/wp-content/themes/veriff/img/img-top-left.png" alt="">
    </figure>
    <div class="container" id="" data-aos-duration="800" data-aos="fade-up">
        <span class="eyebrow">Let’s talk! </span>        <h2>Book a demo or find your solution</h2>        <p>Get help selecting the best Veriff product, schedule a live demo, explore use cases tailored to your team, and more.</p>
        		<div class="content-buttons buttons-justification-star">
												<a class="btn-site btn-primary btn-mode-dark " target="" href="https://www.veriff.com/contact-sales">
						<span class="btn-text">Contact Us							<span><img decoding="async" src="https://spcdn.shortpixel.ai/spio/ret_img,q_cdnize,to_webp,s_webp/www.veriff.com/wp-content/themes/veriff/assets/img/buttonarrow.svg" class="button-arrow" alt="" aria-hidden="true"></span>
						</span>
					</a>
									</div>
	    </div>
</section>



<h2 class="wp-block-heading">Highlights from key sessions</h2>



<p>The summit&#8217;s agenda was filled with insightful presentations from industry leaders. These sessions provided a deeper look into the strategies and technologies shaping marketplace security.</p>



<h3 class="wp-block-heading">Amazon on the five pillars of trust</h3>



<p><a href="https://www.linkedin.com/in/rebecca-mond-9768545/" target="_blank" rel="noopener">Rebecca Mond</a>, Head of External Relations for Customer Trust at <a href="https://www.amazon.com/" target="_blank" rel="noopener">Amazon</a>, delivered a compelling keynote on building a scalable foundation for customer protection. She outlined five pillars that form the architecture of trust:</p>



<ol class="wp-block-list">
<li><strong>Prevention:</strong> Implementing proactive controls, such as robust identity verification (IDV) for sellers and monitoring for suspicious account activity.</li>



<li><strong>Continuous monitoring:</strong> Using automated systems to detect fraud, abuse, and unsafe products in real-time.</li>



<li><strong>Clear &amp; consistent enforcement:</strong> Taking decisive action against bad actors, including removing sellers, blocking accounts, and seizing funds to protect the platform&#8217;s integrity.</li>



<li><strong>Collaboration:</strong> Working with law enforcement, other companies, and industry groups to combat organized fraud and share best practices.</li>



<li><strong>Customer education:</strong> Providing customers with clear, accessible information on safety and scam trends.</li>
</ol>



<p>Mond emphasized that prevention is key, as it reduces the need for downstream enforcement actions.</p>



<h3 class="wp-block-heading">Harnessing intelligence from the deep &amp; dark web</h3>



<p>An insightful session featured <a href="https://www.linkedin.com/in/brittanylorenallen/" target="_blank" rel="noopener">Brittany Allen</a> of <em><a href="https://sift.com/solutions/online-gambling/?campaignid=22667513193&amp;adgroupid=&amp;keyword=&amp;gad_source=1&amp;gad_campaignid=22677312178&amp;gbraid=0AAAAADnvD5c9UvO5-9ibVKOYLIvo07fCk&amp;gclid=CjwKCAiAraXJBhBJEiwAjz7MZVbEry-4OkMUcYWb71w9T511XnNR-_9LokEDD6CWK5aKI385OdTsqRoCaZ4QAvD_BwE" target="_blank" rel="noopener">Sift </a></em>and <a href="https://www.linkedin.com/in/anna-collier-49343b132/" target="_blank" rel="noopener">Anna Collier</a> of <a href="https://www.fanvue.com/" target="_blank" rel="noopener">Fanvue</a>, who spoke about using deep and dark web intelligence to proactively fight fraud. They explained how forums and chat groups on platforms like <a href="https://telegram.org/" target="_blank" rel="noopener">Telegram </a>are used by bad actors to share methods for bypassing a platform’s security, such as its KYC process. By monitoring these channels, Fanvue was able to identify and patch vulnerabilities before they could be widely exploited. This session underscored the importance of external intelligence in a comprehensive fraud prevention strategy.</p>



<h2 class="wp-block-heading">Looking ahead: The future of marketplace risk</h2>



<p><a href="https://www.marketplacerisk.com/event-details-ajw2u/marketplace-risk-global-summit-2025-mrgs25" target="_blank" rel="noopener">The Marketplace Risk Global Summit 2025</a> made it clear that building a safe and trustworthy online environment is a collective responsibility. As fraud becomes more organized and technologically advanced, marketplaces must move beyond siloed approaches and embrace collaboration.</p>



<p>The insights shared in London emphasize a strategic shift toward proactive prevention, automated detection, and intelligent enforcement. By investing in the right technology, fostering cross-industry partnerships, and maintaining clear and consistent policies, platforms can protect their users and their reputation in an increasingly complex digital world.</p>
<p>The post <a rel="nofollow" href="https://www.veriff.com/kyc/learn/key-insights-from-the-marketplace-risk-global-summit-2025">Key insights from the Marketplace Risk Global Summit 2025</a> appeared first on <a rel="nofollow" href="https://www.veriff.com">Veriff</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>What is Address Identification and why it matters for regulated industries?</title>
		<link>https://www.veriff.com/kyc/learn/what-is-address-identification-and-why-it-matters-for-regulated-industries</link>
		
		<dc:creator><![CDATA[agustina.bustinduy@veriff.net]]></dc:creator>
		<pubDate>Wed, 02 Jul 2025 08:10:22 +0000</pubDate>
				<guid isPermaLink="false">https://www.veriff.com/?post_type=kyc-article&#038;p=21774</guid>

					<description><![CDATA[<p>Whether you&#8217;re onboarding a new banking client, a crypto investor, or a gaming customer, verifying a user’s residential address plays a central role in compliance, fraud prevention, and building trust. But what exactly is address identification, and why is it so important—especially in regulated industries? What is Address Identification? Address Identification refers to the process</p>
<p>The post <a rel="nofollow" href="https://www.veriff.com/kyc/learn/what-is-address-identification-and-why-it-matters-for-regulated-industries">What is Address Identification and why it matters for regulated industries?</a> appeared first on <a rel="nofollow" href="https://www.veriff.com">Veriff</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Whether you&#8217;re onboarding a new banking client, a crypto investor, or a gaming customer, verifying a user’s residential address plays a central role in compliance, fraud prevention, and building trust. But what exactly is address identification, and why is it so important—especially in regulated industries?</p>



<h2 class="wp-block-heading">What is Address Identification?</h2>



<p>Address Identification refers to the process of verifying an individual’s current residential address using documents or trusted data sources. It&#8217;s often a core component of Know Your Customer (KYC) and Customer Due Diligence (CDD) processes—especially under Anti-Money Laundering (AML) legislation.</p>



<h3 class="wp-block-heading">Acceptable Proof of Address documents</h3>



<p>In the UK, the<a href="https://www.gov.uk/government/publications/proof-of-identity-checklist/proof-of-identity-checklist" target="_blank" rel="noopener"> Government’s Proof of Identity Checklist</a> outlines acceptable documents for proving both identity and address. For proof of address, these include:</p>



<ul class="wp-block-list">
<li>Utility bills (dated within the last 3 months)<br></li>



<li>Bank or building society statements<br></li>



<li>Council tax bills<br></li>



<li>Mortgage statements<br></li>



<li>Tenancy agreements<br></li>



<li>Government-issued letters<br></li>
</ul>



<p>Importantly, the document must clearly show the customer’s name, current address, and a recent date to be valid.</p>



<h2 class="wp-block-heading">Why is Address Identification so important?</h2>



<h3 class="wp-block-heading">1. Regulatory compliance</h3>



<p>For businesses operating in regulated sectors—like banking, payments, insurance, or online gambling—address identification isn’t optional. Under the UK’s<a href="https://www.gov.uk/guidance/money-laundering-regulations-your-responsibilities" target="_blank" rel="noopener"> Money Laundering Regulations</a>, firms must conduct risk-based identity verification, including gathering evidence of a customer’s residential address.</p>



<p>Financial institutions are expected to assess the credibility of the documents and implement ongoing monitoring to detect inconsistencies or changes in customer details.</p>



<p>The<a href="https://www.handbook.fca.org.uk/handbook/BCOBS/7/3.html" target="_blank" rel="noopener"> FCA Handbook</a> reinforces this obligation. For example, when opening a new account, a firm must take reasonable steps to ensure it has verified the address of the account holder to prevent fraud or misuse of financial services.</p>



<h3 class="wp-block-heading">2. Fraud prevention</h3>



<p>Fraudsters may use stolen or synthetic identities to open accounts, access financial services, or launder money. Address identification provides an extra layer of verification that deters fraud and makes it harder to impersonate real individuals.</p>



<p>Especially in sectors like fintech or crypto—where onboarding happens online and at scale—automated address verification is essential to flag suspicious behavior early.</p>



<h3 class="wp-block-heading">3. Customer trust &amp; operational efficiency</h3>



<p>Verifying someone’s address helps businesses establish trust and reduce downstream issues like failed transactions or regulatory breaches. When done digitally, address checks also speed up the onboarding process and reduce friction—leading to better user experiences.</p>



<h2 class="wp-block-heading">Real-world examples by industry</h2>



<ul class="wp-block-list">
<li>Banking &amp; Payments: Customers must provide proof of address to open current or savings accounts, apply for loans, or access credit. According to<a href="https://www.citizensinformation.ie/en/money-and-tax/personal-finance/banking/financial-institutions-and-identification/" target="_blank" rel="noopener"> Citizens Information</a>, banks require both photographic ID and proof of address under EU regulations.<br></li>



<li>Insurance: Confirming address ensures policyholders reside in eligible regions and helps prevent false claims.<br></li>



<li>Online Gambling: Operators must verify user location and age to comply with regional licensing rules and protect underage users.<br></li>



<li>eCommerce &amp; Marketplaces: Address checks help prevent fraudulent returns, account takeovers, or delivery scams.<br></li>
</ul>



<h2 class="wp-block-heading">How Address Verification works in the digital age</h2>



<p>Modern identity verification platforms simplify the process by allowing users to upload documents or verify their address through secure data lookups. Advanced solutions may include:</p>



<ul class="wp-block-list">
<li>Optical Character Recognition (OCR) to extract data from scanned documents<br></li>



<li>Liveness detection and biometrics to match documents to users<br></li>



<li>Geolocation and IP analysis to ensure consistency<br></li>



<li>AI-based fraud detection to flag anomalies<br></li>
</ul>



<p>This layered approach enhances security while minimizing manual review and onboarding delays.</p>



<h2 class="wp-block-heading">Key features of Veriff PoA include:</h2>



<ul class="wp-block-list">
<li><strong>Rapid results:</strong> response with less than 30 seconds, improving onboarding speed and reducing user drop-off</li>



<li><strong>Global reach</strong>: recognizes documents in over 40 languages across major global scripts, including Arabic, Cyrillic, Japanese, and Latin.</li>



<li><strong>Document tamper detection</strong>: advanced, multi-layered checks detect signs of tampered, fake, or reused documents to reduce the risk of fraud.</li>



<li><strong>Non-document-based verification</strong>: this option verifies addresses against trusted third-party databases, reducing the need for document uploads.</li>



<li><strong>Integration flexibility:</strong> the solution can be incorporated into existing onboarding processes or used for standalone checks.</li>
</ul>



<p>“As industries race toward digital transformation, proof of address checks often remain manual and slow, yet it’s an important step in building trust and meeting regulations,” explained <strong>Oana Barbacaru, Senior Product Manager at Veriff</strong>. “Our new AI-based solution delivers a decision in less than 30 seconds, with top-tier accuracy and built-in fraud prevention. It’s reliable, fast, reduces friction &#8211; built for the future of<a href="https://www.veriff.com/kyc/news/detecting-money-laundering-a-comprehensive-guide"> KYC</a>,” she added.</p>



<p>Oana Barbacaru, Senior Product Manager at Veriff:&nbsp;</p>



<p><strong>&#8220;Our new AI-based Proof of Address solution is reliable, fast, reduces friction &#8211; built for the future of KYC.&#8221;</strong></p>



<h2 class="wp-block-heading">Veriff PoA can be applied to use cases such as:</h2>



<ul class="wp-block-list">
<li>Customer onboarding in banking, fintech, and gaming</li>



<li>Right-to-work checks and<a href="https://www.veriff.com/case-studies/securing-onboarding-high-risk-company"> employee onboarding</a></li>



<li>User verification for home-sharing and gig platforms</li>



<li>Address confirmation for insurance policies and risk assessments</li>



<li>Location-based compliance in gambling and gaming</li>
</ul>



<figure class="wp-block-image size-large"><img fetchpriority="high" decoding="async" width="659" height="1024" src="https://spcdn.shortpixel.ai/spio/ret_img,q_cdnize,to_webp,s_webp/www.veriff.com/wp-content/uploads/2025/07/Image-1-vertical-659x1024.jpg" alt="" class="wp-image-21776" srcset="https://spcdn.shortpixel.ai/spio/ret_img,q_cdnize,to_webp,s_webp/www.veriff.com/wp-content/uploads/2025/07/Image-1-vertical-659x1024.jpg 659w, https://spcdn.shortpixel.ai/spio/ret_img,q_cdnize,to_webp,s_webp/www.veriff.com/wp-content/uploads/2025/07/Image-1-vertical-193x300.jpg 193w, https://spcdn.shortpixel.ai/spio/ret_img,q_cdnize,to_webp,s_webp/www.veriff.com/wp-content/uploads/2025/07/Image-1-vertical-768x1194.jpg 768w, https://spcdn.shortpixel.ai/spio/ret_img,q_cdnize,to_webp,s_webp/www.veriff.com/wp-content/uploads/2025/07/Image-1-vertical-988x1536.jpg 988w, https://spcdn.shortpixel.ai/spio/ret_img,q_cdnize,to_webp,s_webp/www.veriff.com/wp-content/uploads/2025/07/Image-1-vertical.jpg 1146w" sizes="(max-width: 659px) 100vw, 659px" /></figure>



<h2 class="wp-block-heading">Final thoughts</h2>



<p>Address identification may seem like a basic step—but in regulated industries, it’s foundational. It strengthens compliance, deters fraud, and builds the trust needed for safe digital interactions.</p>



<p>As financial crime grows more sophisticated, so must your verification tools. Getting address verification right isn’t just about ticking boxes—it’s about protecting your business and your customers.</p>



<h2 class="wp-block-heading">FAQs:</h2>



<ol class="wp-block-list">
<li>Can a driver’s license be used as proof of address?</li>
</ol>



<p>In some countries, a driver’s license is accepted as both photo ID and proof of address. However, in many regulated industries, you may still be required to provide an additional document—such as a utility bill or bank statement—for separate address verification.</p>



<ol start="2" class="wp-block-list">
<li>Why was my proof of address document rejected?</li>
</ol>



<p>There are several common reasons for rejection:</p>



<ul class="wp-block-list">
<li>The document is too old (typically older than 90 days)<br></li>



<li>The address is incomplete or illegible<br></li>



<li>The name on the document does not match the ID<br></li>



<li>The document type is not accepted (e.g., handwritten letters or mobile screenshots)<br></li>
</ul>



<p>Always check the specific requirements of the institution you’re dealing with.</p>



<ol start="3" class="wp-block-list">
<li>Is a digital document or PDF acceptable?</li>
</ol>



<p>&nbsp;Yes, many businesses and verification platforms accept digital documents, such as PDF bank statements downloaded from your online banking portal. However, screenshots may be rejected if they can’t be authenticated.</p>



<ol start="4" class="wp-block-list">
<li>How often do I need to provide proof of address?</li>
</ol>



<p>&nbsp;You typically need to provide proof of address when:</p>



<ul class="wp-block-list">
<li>Opening a bank account<br></li>



<li>Registering with a financial service<br></li>



<li>Applying for credit or insurance<br></li>



<li>Updating your KYC records<br></li>
</ul>



<p>In regulated sectors, firms may also request updated proof periodically to comply with ongoing monitoring obligations.</p>



<section class="general-section promo-card block-content alignfull   size-default heading-white text-white" style="background:#03282C no-repeat; text-align: left !important; margin-top: 100px; margin-bottom: 100px; padding: 50px 0 50px;" id="block_61c807809bb28d905bf90bd427b1faf4">
            <figure class="icon-left-top-col">
        <img decoding="async" src="https://spcdn.shortpixel.ai/spio/ret_img,q_cdnize,to_webp,s_webp/www.veriff.com/wp-content/themes/veriff/img/img-top-left.png" alt="">
    </figure>
    <div class="container" id="" data-aos-duration="800" data-aos="fade-up">
                <h2>Looking to simplify address identification for your business? </h2>        <p><span style="font-weight: 400">Discover how Veriff helps regulated industries stay compliant and onboard customers faster with seamless identity and address verification.</span></p>
        		<div class="content-buttons buttons-justification-star">
												<a class="btn-site btn-primary btn-mode-dark " target="" href="https://www.veriff.com/product/identity-verification-platform">
						<span class="btn-text">Explore our solutions							<span><img decoding="async" src="https://spcdn.shortpixel.ai/spio/ret_img,q_cdnize,to_webp,s_webp/www.veriff.com/wp-content/themes/veriff/assets/img/buttonarrow.svg" class="button-arrow" alt="" aria-hidden="true"></span>
						</span>
					</a>
									</div>
	    </div>
</section>
<p>The post <a rel="nofollow" href="https://www.veriff.com/kyc/learn/what-is-address-identification-and-why-it-matters-for-regulated-industries">What is Address Identification and why it matters for regulated industries?</a> appeared first on <a rel="nofollow" href="https://www.veriff.com">Veriff</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Enhanced Due Diligence checklist: Strengthen your KYC process with confidence</title>
		<link>https://www.veriff.com/kyc/learn/enhanced-due-diligence-checklist</link>
		
		<dc:creator><![CDATA[agustina.bustinduy@veriff.net]]></dc:creator>
		<pubDate>Wed, 09 Apr 2025 13:01:00 +0000</pubDate>
				<category><![CDATA[KYC]]></category>
		<guid isPermaLink="false">https://www.veriff.com/?post_type=kyc-article&#038;p=12122</guid>

					<description><![CDATA[<p>In an era where identity fraud and financial crime are rapidly evolving, basic&#160;Know Your Customer (KYC)&#160;measures are no longer enough. Financial institutions, fintechs, and crypto platforms are required to go beyond surface-level checks with&#160;Enhanced Due Diligence (EDD)&#160;— a critical pillar of&#160;Anti-Money Laundering (AML) compliance&#160;and trust-building. This guide provides an actionable Enhanced Due Diligence Checklist and</p>
<p>The post <a rel="nofollow" href="https://www.veriff.com/kyc/learn/enhanced-due-diligence-checklist">Enhanced Due Diligence checklist: Strengthen your KYC process with confidence</a> appeared first on <a rel="nofollow" href="https://www.veriff.com">Veriff</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>In an era where identity fraud and financial crime are rapidly evolving, basic&nbsp;<a href="https://www.veriff.com/product/kyc-onboarding">Know Your Customer (KYC)&nbsp;</a>measures are no longer enough. Financial institutions, fintechs, and crypto platforms are required to go beyond surface-level checks with&nbsp;<a href="https://www.veriff.com/blog/what-is-enhanced-due-diligence-edd-in-banking">Enhanced Due Diligence (EDD)&nbsp;</a>— a critical pillar of&nbsp;<a href="https://www.veriff.com/fraud/news/aml-regulations-gambling-industry-global">Anti-Money Laundering (AML) compliance&nbsp;</a>and trust-building.</p>



<p>This guide provides an actionable Enhanced Due Diligence Checklist and shows how Veriff helps streamline, scale, and secure your EDD process.</p>



<h2 class="wp-block-heading">What is Enhanced Due Diligence (EDD)?</h2>



<p>Enhanced due diligence process is a deeper level of customer vetting used to identify and monitor high-risk clients or transactions. It builds on standard due diligence by adding layers of verification, monitoring, and risk assessment—especially important for:</p>



<ul class="wp-block-list">
<li>Politically Exposed Persons (PEPs)</li>



<li>Clients in high-risk jurisdictions</li>



<li>Crypto or gambling users</li>



<li>Complex corporate structures</li>



<li>Unusual transaction patterns</li>
</ul>



<p>Failing to implement&nbsp;<a href="https://www.veriff.com/blog/enhanced-due-diligence-edd-in-the-kyc-process">EDD</a>&nbsp;properly can result in regulatory fines, reputational loss, and exposure to serious fraud.</p>



<p>Enhanced due diligence process is a deeper level of customer vetting used to identify and monitor high-risk clients or transactions. It builds on standard due diligence by adding layers of verification, monitoring, and risk assessment—especially important for:</p>



<ul class="wp-block-list">
<li>Politically Exposed Persons (PEPs)</li>



<li>Clients in high-risk jurisdictions</li>



<li>Crypto or gambling users</li>



<li>Complex corporate structures</li>



<li>Unusual transaction patterns</li>
</ul>



<p>Failing to implement EDD properly can result in regulatory fines, reputational loss, and exposure to serious fraud.</p>



<h2 class="wp-block-heading">Benefits of Enhanced Due Diligence</h2>



<p><a href="https://www.veriff.com/blog/enhanced-due-diligence-edd-in-the-kyc-process">Enhanced Due Diligence (EDD)&nbsp;</a>offers numerous benefits to financial institutions and organizations. Some of the key advantages of EDD include:</p>



<p>EDD helps identify and mitigate risks associated with high-risk customers or transactions, reducing the likelihood of financial crimes and reputational damage. By thoroughly vetting high-risk entities, financial institutions can proactively address potential threats before they escalate.</p>



<p>EDD ensures compliance with<a href="https://www.veriff.com/kyc/learn/anti-money-laundering-customer-due-diligence">&nbsp;anti-money laundering (AML) regulations a</a>nd financial crime prevention laws, reducing the risk of fines and penalties. Adhering to these stringent requirements demonstrates a commitment to regulatory standards and helps avoid costly legal repercussions.</p>



<p>Enhanced Due Diligence (EDD) provides financial institutions with a deeper and more comprehensive understanding of their customers and their transactions. By analyzing detailed customer data, EDD allows these institutions to make well-informed decisions about their business relationships. This level of transparency not only fosters trust but also enables more precise risk assessments, ensuring that institutions can better evaluate the potential risks associated with their customers and partners.</p>



<p>One of the key benefits of EDD is its ability to help prevent money laundering and terrorist financing, both of which pose significant threats to the financial sector. By identifying unusual or suspicious activities early in the process, EDD reduces the risk of financial losses and safeguards against reputational damage. Institutions can act quickly to address potential threats, protecting their assets and maintaining compliance with stringent regulatory requirements.</p>



<p>In addition to mitigating risks, EDD plays a vital role in building trust with customers. By demonstrating a clear commitment to transparency, security, and compliance, financial institutions can enhance their credibility in the eyes of their clients. This trust is critical for establishing and maintaining long-term business relationships, as well as fostering customer loyalty in an increasingly competitive market. Ultimately, EDD not only ensures regulatory compliance but also supports the growth and integrity of financial institutions by creating a secure and trustworthy environment for their customers.</p>



<section class="general-section promo-card block-content alignfull   size-default heading-white text-white" style="background:#03282C no-repeat; text-align: left !important; margin-top: 50px; margin-bottom: 50px; padding: 100px 0 100px;" id="block_c93b2adb2fdd50d5188a7baca98bbb11">
            <figure class="icon-left-top-col">
        <img decoding="async" src="https://spcdn.shortpixel.ai/spio/ret_img,q_cdnize,to_webp,s_webp/www.veriff.com/wp-content/themes/veriff/img/img-top-left.png" alt="">
    </figure>
    <div class="container" id="" data-aos-duration="800" data-aos="fade-up">
                <h3>Transform Your KYC Strategy Today</h3>        <p>Explore the Gartner Market Guide for KYC Platforms for Banking</p>
        		<div class="content-buttons buttons-justification-star">
												<a class="btn-site btn-primary btn-mode-dark " target="" href="https://www.veriff.com/resources/ebooks/veriff-gartner-report/">
						<span class="btn-text">Get the report							<span><img decoding="async" src="https://spcdn.shortpixel.ai/spio/ret_img,q_cdnize,to_webp,s_webp/www.veriff.com/wp-content/themes/veriff/assets/img/buttonarrow.svg" class="button-arrow" alt="" aria-hidden="true"></span>
						</span>
					</a>
									</div>
	    </div>
</section>



<h2 class="wp-block-heading">Transform Your KYC Strategy Today</h2>



<p>Explore the Gartner Market Guide for KYC Platforms for Banking</p>



<p><a href="https://www.veriff.com/resources/ebooks/veriff-gartner-report">DOWNLOAD NOW</a></p>



<figure class="wp-block-image"><a href="https://www.veriff.com/resources/ebooks/veriff-gartner-report"><img decoding="async" src="https://images.prismic.io/veriff/Z5tv_ZbqstJ9-Cfg_24-gartner-report.png?auto=format,compress" alt=""/></a></figure>



<h2 class="wp-block-heading">Your essential enhanced Due Diligence checklist</h2>



<p>Here’s what every&nbsp;<a href="https://www.veriff.com/kyc/learn/enhanced-due-diligence-checklist">EDD program&nbsp;</a>should include to mitigate risk and build long-term trust:</p>



<p>A well-defined diligence process is crucial for assessing high-risk customers and ensuring compliance with regulations.</p>



<h3 class="wp-block-heading">1. Initial risk profiling</h3>



<ul class="wp-block-list">
<li>Conduct <a href="https://www.veriff.com/fraud/news/veriff-launches-riskscore">user risk scoring based </a>on jurisdiction, industry, transaction patterns</li>



<li>Include device, behavioral, and fraud analytics from the start</li>
</ul>



<h3 class="wp-block-heading">2. PEP &amp; Sanctions screening</h3>



<ul class="wp-block-list">
<li><a href="https://www.veriff.com/product/aml-screening">Real-time screening </a>against OFAC, UN, HMT, EU, and other global watchlists</li>



<li>Use tools that continuously monitor changes, not just point-in-time checks</li>
</ul>



<h3 class="wp-block-heading">3. Adverse media screening</h3>



<ul class="wp-block-list">
<li>Scan 150+ million sources for negative news (fraud, financial crime, political exposure)</li>



<li>Enable auto-flagging for predicate offenses or media triggers</li>
</ul>



<h3 class="wp-block-heading">4. Document and Identity Verification</h3>



<ul class="wp-block-list">
<li>Require ID, <a href="https://www.veriff.com/product/proof-of-address">Proof of Address</a>, and business registration documents</li>



<li>Validate document authenticity with AI-powered tools and assisted image capture</li>



<li><a href="https://www.veriff.com/product/identity-verification">Support 12,000+ ID types in 48 languages for global verification</a></li>
</ul>



<h3 class="wp-block-heading">5. Source of funds / Wealth assessment</h3>



<ul class="wp-block-list">
<li>Request and verify bank statements, employment records, corporate ownership</li>



<li>Use network/device analytics to uncover inconsistencies in submitted data</li>
</ul>



<h3 class="wp-block-heading">6. Ongoing monitoring and reassessment</h3>



<ul class="wp-block-list">
<li>Re-screen high-risk clients periodically</li>



<li>Implement biometric re-authentication to validate returning users</li>



<li><a href="https://www.veriff.com/blog/aml-transaction-monitoring-procedures-and-rules">Monitor transaction activity f</a>or anomalies in real-time</li>
</ul>



<p>Additionally, implement enhanced due diligence procedures to manage high-risk customers, particularly politically exposed persons (PEPs), by using a risk-based approach to determine the necessary information to collect.</p>



<h2 class="wp-block-heading">How Veriff supercharges your EDD process</h2>



<p>With Veriff, you can turn your enhanced due diligence process into a scalable, reliable compliance engine—powered by automation, biometric intelligence, and real-time risk signals:</p>



<p><a href="https://www.veriff.com/">Veriff</a>&nbsp;offers comprehensive identity verification and AML screening solutions to help businesses ensure compliance and reduce fraud. With access to a global library of&nbsp;<a href="https://www.veriff.com/supported-countries?keyword=veriff&#038;sfcid=7019N0000009CVoQAM&#038;utm_term=veriff&#038;utm_campaign=EMEA_Search_Brand&#038;utm_source=google&#038;utm_medium=cpc&#038;utm_content=&#038;hsa_acc=1064629533&#038;hsa_cam=21660211410&#038;hsa_grp=166191580719&#038;hsa_ad=712212650623&#038;hsa_src=g&#038;hsa_tgt=kwd-355256337048&#038;hsa_kw=veriff&#038;hsa_mt=p&#038;hsa_net=adwords&#038;hsa_ver=3&#038;gad_source=1&#038;gclid=CjwKCAjwtdi_BhACEiwA97y8BA-okO9wPTlR2sKt6quvEC7UXiEFaLnU4z9hLs-yoPFpbc82HBKUzxoC5EUQAvD_BwE">over 12,000 identity documents across 230+ countries</a>, Veriff combines advanced fraud detection, assisted image capture, and passive liveness detection to streamline user onboarding while minimizing friction. Its AML tools screen users against global PEP, sanctions, and adverse media lists, with continuous monitoring to alert businesses of changes instantly. Additionally, Veriff scans over 150 million media sources for adverse media and background checks, building robust customer risk profiles. Customizable onboarding flows with omnichannel support allow businesses to tailor the user experience, adding branding and compliance-specific features as needed.</p>



<h2 class="wp-block-heading">Customer identification and information</h2>



<p>Customer identification and information are critical components of&nbsp;<a href="https://www.veriff.com/blog/what-is-due-diligence-in-finance">Enhanced Due Diligence (EDD)</a>. Financial institutions must gather and verify information about their customers, including:</p>



<h3 class="wp-block-heading">Identity Verification:</h3>



<p><a href="https://www.veriff.com/product/identity-verification">Verifying the customer’s identity&nbsp;</a>through government-issued documents, such as passports or driver’s licenses. This step ensures that the individual is who they claim to be and helps prevent identity fraud.</p>



<figure class="wp-block-embed is-type-rich is-provider-embed-handler wp-block-embed-embed-handler wp-embed-aspect-16-9 wp-has-aspect-ratio"><div class="wp-block-embed__wrapper">
<iframe title="Simplifying identity verification | Try Veriff for free" width="640" height="360" src="https://www.youtube.com/embed/wPqmOegyfug?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe>
</div></figure>



<h3 class="wp-block-heading">Address Verification</h3>



<p>Verifying the customer’s address through utility bills or other documents. Confirming the address adds another layer of assurance and helps in tracking the customer’s location.</p>



<h3 class="wp-block-heading">Source of funds</h3>



<p>Verifying the source of the customer’s funds to ensure they are legitimate and not derived from illicit activities. This involves reviewing bank statements, employment records, and other financial documents to confirm the origin of the funds.</p>



<h3 class="wp-block-heading">Ultimate beneficial ownership</h3>



<p>Identifying the ultimate beneficial owner of the customer’s assets to prevent money laundering and terrorist financing. Understanding who ultimately controls the assets helps in assessing the true risk associated with the customer.</p>



<h3 class="wp-block-heading">Transaction monitoring</h3>



<p>Monitoring the customer’s transactions to identify suspicious activity and prevent financial crimes. Continuous transaction monitoring allows financial institutions to detect and respond to unusual patterns in real-time.</p>



<h2 class="wp-block-heading">High-risk entities and Enhanced Due Diligence</h2>



<p>High-risk entities, such as Politically Exposed Persons (PEPs) and companies operating in high-risk countries, require&nbsp;<a href="https://www.veriff.com/blog/enhanced-due-diligence-edd-in-the-kyc-process">Enhanced Due Diligence (EDD)</a>&nbsp;to effectively reduce the risk of financial crimes like money laundering, fraud, and terrorist financing. Financial institutions must take a proactive approach to identify, assess, and mitigate risks associated with these entities. Here are the critical steps involved:</p>



<p>Financial institutions need to perform thorough risk assessments to identify potential risks tied to high-risk entities. This process involves evaluating the entity’s background, including their ownership structure, business activities, and geographical location, to determine their level of risk exposure. High-risk countries, for example, may have weak regulatory frameworks or higher corruption levels, which increases the likelihood of financial crimes. Assessments should also consider the nature of the entity’s transactions and their potential for misuse by bad actors.</p>



<p>Collecting comprehensive data about high-risk entities is essential for building a detailed risk profile. This includes analyzing the entity’s business activities, key relationships, sources of funds, and transaction histories. Financial institutions often need to go beyond standard due diligence by requesting documentation such as corporate records, ownership certificates, and explanations of transaction purposes. This deeper level of scrutiny ensures that no critical details are missed and helps identify potential red flags early on.</p>



<p>Transactions involving high-risk entities must be closely monitored to detect suspicious activity, such as unusual patterns, large sums of money, or transfers to jurisdictions with weak regulations. Continuous monitoring allows institutions to respond quickly to potential threats, flagging transactions that might indicate money laundering or other financial crimes. Advanced analytics and AI tools can assist in identifying patterns and anomalies that would otherwise go unnoticed, ensuring a more robust detection process.</p>



<p>To prevent money laundering and terrorist financing, financial institutions must implement stricter controls for high-risk entities. These include enhanced customer due diligence procedures, ongoing monitoring of accounts, and regular audits. Enhanced controls may also involve requiring additional approvals for high-value transactions or maintaining detailed reporting protocols. By putting these measures in place, institutions can safeguard the integrity of their financial systems and comply with regulatory requirements.</p>



<p>Overall,&nbsp;<a href="https://www.veriff.com/blog/what-is-enhanced-due-diligence-edd-in-banking">Enhanced Due Diligence&nbsp;</a>is a vital component of any financial institution’s effort to maintain compliance and reduce exposure to financial crime risks. By adopting these rigorous practices, institutions can protect their reputation, build trust with their customers, and contribute to global efforts to combat illicit financial activities.</p>



<h2 class="wp-block-heading">Best practices for successful Enhanced Due Diligence</h2>



<p>To ensure successful Enhanced Due Diligence (EDD), financial institutions should follow best practices, including:</p>



<h3 class="wp-block-heading"><strong>Implementing a risk-based approach</strong></h3>



<p>Implementing a&nbsp;<a href="https://www.veriff.com/fraud/news/veriff-launches-riskscore">risk-based approach to EDD</a>, focusing on high-risk customers and transactions. This approach allows institutions to allocate resources effectively and prioritize the most significant risks.</p>



<h3 class="wp-block-heading"><strong>Conducting regular risk assessments</strong></h3>



<p>Conducting regular risk assessments to identify potential risks and update EDD procedures accordingly. Regular assessments ensure that the institution’s risk management strategies remain current and effective.</p>



<h3 class="wp-block-heading"><strong>Providing ongoing training</strong></h3>



<p>Providing ongoing training to employees on&nbsp;<a href="https://www.veriff.com/blog/what-is-due-diligence-in-finance">EDD procedures&nbsp;</a>and best practices. Continuous education ensures that staff are well-equipped to identify and manage risks effectively.</p>



<h3 class="wp-block-heading"><strong>Using technology</strong></h3>



<p>Using technology, such as automated risk assessment tools, to streamline EDD processes and improve efficiency. Advanced technologies can enhance the accuracy and speed of due diligence procedures, reducing the burden on compliance teams.</p>



<h3 class="wp-block-heading"><strong>Maintaining accurate records</strong></h3>



<p>Maintaining accurate records of EDD procedures and results to ensure compliance with regulatory requirements. Detailed documentation is essential for demonstrating compliance during audits and regulatory reviews.</p>



<h2 class="wp-block-heading">Veriff and Easygo/Stake: Streamlining player onboarding</h2>



<p><a href="https://www.veriff.com/case-studies/veriff-and-easygostake">Easygo</a>, a global software development startup, faced challenges in verifying customer age and residency for its subsidiary,<a href="https://stake.us/" target="_blank" rel="noopener">&nbsp;Stake.us.</a>&nbsp;Initially, they relied on manual in-house KYC screening, which was labor-intensive and caused significant delays, with some customers waiting over a week for verification. By integrating Veriff&#8217;s automated identity verification solution, Easygo achieved near-real-time validation, eliminating backlogs and enhancing the customer experience. This implementation also effectively identified and removed fraudulent actors attempting to exploit the system.</p>



<p>This case study demonstrate the versatility and effectiveness of Enhanced Due Diligence, showcasing how Veriff&#8217;s solutions contribute to compliance, fraud prevention, and improved user experiences.​</p>
<p>The post <a rel="nofollow" href="https://www.veriff.com/kyc/learn/enhanced-due-diligence-checklist">Enhanced Due Diligence checklist: Strengthen your KYC process with confidence</a> appeared first on <a rel="nofollow" href="https://www.veriff.com">Veriff</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Deceptive looks: can machines pinpoint person&#8217;s age?</title>
		<link>https://www.veriff.com/kyc/learn/detecting-persons-age-online</link>
		
		<dc:creator><![CDATA[agustina.bustinduy@veriff.net]]></dc:creator>
		<pubDate>Fri, 13 Dec 2024 19:58:00 +0000</pubDate>
				<category><![CDATA[KYC]]></category>
		<category><![CDATA[Age Estimation]]></category>
		<guid isPermaLink="false">https://www.veriff.com/?post_type=kyc-article&#038;p=3492</guid>

					<description><![CDATA[<p>Detecting a person’s age online is becoming faster, more accurate, and surprisingly smart. But is a selfie really enough to determine someone’s age? What role does biometrics play in combating various types of fraud? Aleksander Tsuiman, Head of Product Legal and Privacy at Veriff,&#160;provided insights in an interview&#160;into a world where a six-second decision determines</p>
<p>The post <a rel="nofollow" href="https://www.veriff.com/kyc/learn/detecting-persons-age-online">Deceptive looks: can machines pinpoint person&#8217;s age?</a> appeared first on <a rel="nofollow" href="https://www.veriff.com">Veriff</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Detecting a person’s age online is becoming faster, more accurate, and surprisingly smart. But is a selfie really enough to determine someone’s age? What role does biometrics play in combating various types of fraud? Aleksander Tsuiman, Head of Product Legal and Privacy at Veriff,&nbsp;<a target="_blank" href="https://tehnika.postimees.ee/8149436/reetlik-valimus-kas-masinad-suudavad-tapselt-oelda-kui-vana-on-inimene" rel="noreferrer noopener">provided insights in an interview</a>&nbsp;into a world where a six-second decision determines whether you can access a social network, buy alcohol, play video games, or confirm if the person in front of the camera is indeed the one holding the passport or ID card.</p>



<h3 class="wp-block-heading"><strong>The debate on age restrictions for minors</strong></h3>



<p>Australia has taken a step towards&nbsp;<a target="_blank" href="https://techcrunch.com/2024/12/07/as-australia-bans-social-media-for-kids-under-16-age-assurance-tech-is-in-the-spotlight/" rel="noreferrer noopener">restricting social media access</a>&nbsp;for minors due to concerns about its impact on their developing worldview. Similar debates are taking place in several U.S. states. While a store clerk or security guard might be able to estimate a person’s age at a glance, it’s not foolproof. Sometimes, a youthful-looking adult is mistaken for a minor, while a teenager with newly grown facial hair can slip past age filters.</p>



<p>So, the obvious question arises: could machines do this better than humans?</p>



<h3 class="wp-block-heading"><strong>Where Veriff comes into play</strong></h3>



<p>Veriff skyrocketed in popularity by offering identity verification using video camera images. The user shows their ID in front of the camera, and Veriff’s platform cross-checks the visual data with information from the document. The system also includes a &#8220;liveness&#8221; test to confirm that a real, live person is present — all part of a process that takes just six seconds.</p>



<p>But what happens if an ID isn’t available, or if requesting it would reveal too much personal information? Aleksander Tsuiman explains the company’s approach to this challenge.</p>



<h3 class="wp-block-heading"><strong>Using biometric data to estimate age</strong></h3>



<p>Tsuiman confirms that online age detection is entirely possible. AI can analyze our features well enough to estimate our age with surprising accuracy. But what are the most effective technologies for this? Does it rely on documents, facial recognition, or something else?</p>



<p>The general trend is toward using biometric data for both identity verification and age estimation. However, a combination of different checks and data points is more accurate and secure than relying solely on facial recognition. For example, if biometric data is supplemented with ID document checks, the likelihood of accurately determining a person’s age increases significantly.</p>



<h3 class="wp-block-heading"><strong>Veriff’s technological developments</strong></h3>



<p>Veriff continues to expand its portfolio of biometric verification tools. Tsuiman notes that some exciting developments are in the works, and more details may be revealed next year. Currently, Veriff employs&nbsp;<a target="_blank" href="https://www.veriff.com/product/biometric-authentication" rel="noreferrer noopener">Biometric Authentication</a>&nbsp;for repeat users who have already undergone a comprehensive identity verification process.</p>



<p>&#8220;While most people are honest, around 5-6% of all sessions involve fraudsters attempting to pose as someone else,&#8221; says Tsuiman.</p>



<p>The company&#8217;s verification process analyzes more than 1,000 different data points, including biometric and behavioral data, document information, and device and network details. If necessary, additional verification checks can be added upon a customer&#8217;s request.</p>



<p>The process is largely automated, with decisions typically made in about six seconds. If the automated system cannot reach a definitive conclusion, human reviewers step in, which may take more time. The demand for real-time responses has driven improvements in the service, reducing decision times from several seconds to just one second for repeat users undergoing biometric authentication.</p>



<p>Veriff is also developing an&nbsp;<a target="_blank" href="https://www.veriff.com/product/age-estimation" rel="noreferrer noopener">Age Estimation</a>&nbsp;product. It’s a solution designed to enable rapid age verification with just a selfie — no ID required.</p>



<p>This tool is particularly useful for companies that want to ensure user safety (especially for minors) but prefer not to request ID documents due to privacy or ethical concerns. The system can be used in both virtual and physical settings, such as video game platforms, social media sites, dating apps, self-checkout purchases of age-restricted products, or entry to bars and nightclubs.</p>



<p>According to Tsuiman, Veriff also uses cross-session data analysis for&nbsp;<a target="_blank" href="https://www.veriff.com/product/fraud-protect" rel="noreferrer noopener">fraud</a>&nbsp;detection. This means that data from multiple verification sessions is analyzed to identify so-called &#8220;serial fraudsters.&#8221;</p>



<p>While most users are honest, about 5-6% of all sessions are flagged for fraudulent attempts to impersonate someone else (source:&nbsp;<a target="_blank" href="https://www.veriff.com/resources/ebooks/veriff-identity-fraud-report-2025" rel="noreferrer noopener">Veriff Identity Fraud Report 2025</a>)</p>



<h3 class="wp-block-heading"><strong>How does age verification ensure privacy and data security?</strong></h3>



<p>User privacy and security are paramount. People need to know why their data is being processed, who has access to it, and how it will be used.</p>



<p>Any form of personal data processing, including data collection, must have a lawful basis. For example, in most cases, the platform (like a social media network) is responsible for ensuring legal compliance since they control how the data is used.</p>



<p>Data security depends on the measures in place to protect confidentiality, integrity, and availability. Encryption during data transfer and storage, controlled internal access to data, and regular system testing are critical measures. Security protocols, policies, and employee awareness are also essential for protecting sensitive information.</p>



<p>Tsuiman notes that companies with industry-recognized&nbsp;<a target="_blank" href="https://trust.veriff.com/" rel="noreferrer noopener">security certifications</a>&nbsp;(like SOC2, ISO 27001, etc.) and clearly defined information security principles are generally more trustworthy.</p>



<h3 class="wp-block-heading"><strong>Adapting to New Regulations and International Markets</strong></h3>



<p>If a country, such as Australia, decides to enforce stricter age verification on well-known platforms, how easily can Veriff’s solutions be integrated? Tsuiman believes Veriff’s technology would be beneficial for platforms in Australia and in several U.S. states with similar initiatives.</p>



<p>Veriff has discussed potential collaboration with several well-known platforms, but, in most cases, platforms only approach identity verification providers when required by legislation.</p>



<p>One positive example of proactive implementation is Veriff’s collaboration with&nbsp;<a target="_blank" href="https://www.veriff.com/case-studies/veriff-starship-partnership-announcement" rel="noreferrer noopener">Starship Technologies</a>. Customers using Starship’s delivery robots must undergo age verification not only when placing an order for age-restricted products but also when retrieving the order from the robot.</p>



<h3 class="wp-block-heading"><strong>How can we prevent the misuse of age estimation systems?</strong></h3>



<p>Preventing misuse requires verifying the source of the information. Veriff uses a combination of over 1,000 different data points for identity verification, including biometric, behavioral, and device data, as well as network connection details.</p>



<p>Combining multiple verification methods is always more effective than relying on a single source of information.</p>



<h3 class="wp-block-heading"><strong>Legal and ethical considerations of age verification</strong></h3>



<p>Under European Union law, the right to personal data protection is a fundamental right. While&nbsp;<a target="_blank" href="https://www.veriff.com/identity-verification/news/seven-key-data-protection-principles-of-gdpr" rel="noreferrer noopener">GDPR</a>&nbsp;is a key part of this framework, it doesn&#8217;t prevent states from requiring data collection for specific legal purposes. For instance, health services are legally required to collect certain personal data to provide care, and financial transactions are monitored for audit and regulatory compliance.</p>



<p>When it comes to age verification, companies must assess whether the data collection is necessary and proportionate to achieve a specific purpose. The GDPR principles require data minimization, accuracy, and storage limitations.</p>



<p>If a country mandates age verification, the law should specify the data collection requirements and the type of data that can and cannot be collected. Without clear guidelines, companies must decide on the most effective way to achieve age verification while respecting users&#8217; privacy rights.</p>



<h3 class="wp-block-heading"><strong>Avoiding discrimination and overburdening users</strong></h3>



<p>Technology must be properly designed and implemented to avoid discrimination against specific user groups. This is especially relevant for platforms with users from diverse regions, whether it&#8217;s Australia, Estonia, or India.</p>



<p>To reduce the burden on users, companies can design simple, user-friendly experiences. For example, facial recognition-based systems are convenient but may face legal challenges if banned for age verification.</p>



<p>Tsuiman emphasizes that privacy-friendly technologies and solutions exist. Lawmakers should involve industry experts in discussions about regulatory requirements, as this ensures balanced and technically feasible solutions.</p>



<h3 class="wp-block-heading"><strong>How to verify age in countries without standardized IDs?</strong></h3>



<p>Many countries have ID systems, but the quality varies. Facial recognition-based solutions offer a practical approach, especially in countries without standardized documents. Where possible, additional cross-checks can be conducted using databases or registries, though this approach raises data protection challenges.</p>



<h3 class="wp-block-heading"><strong>The future of online age verification</strong></h3>



<p>AI is already proving its potential to assess age, and future developments will only improve accuracy. Countries like Australia, and some&nbsp;<a target="_blank" href="https://www.veriff.com/fraud/learn/age-verification-legalization-in-the-united-states-of-america" rel="noreferrer noopener">U.S. states</a>, are exploring regulatory frameworks to protect children online. Veriff’s solutions, like Age Estimation, offer a privacy-conscious approach to age verification without needing official ID documents.</p>



<p>With solutions like&nbsp;<a href="https://www.veriff.com/">Veriff’s</a>&nbsp;in development, the ability to accurately verify age using only a selfie may soon become a standard feature of online platforms. It’s a step forward in online safety, privacy, and fraud prevention.</p>
<p>The post <a rel="nofollow" href="https://www.veriff.com/kyc/learn/detecting-persons-age-online">Deceptive looks: can machines pinpoint person&#8217;s age?</a> appeared first on <a rel="nofollow" href="https://www.veriff.com">Veriff</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>KYC issues and challenges</title>
		<link>https://www.veriff.com/kyc/learn/kyc-issues-and-challenges</link>
		
		<dc:creator><![CDATA[agustina.bustinduy@veriff.net]]></dc:creator>
		<pubDate>Thu, 22 Aug 2024 20:12:00 +0000</pubDate>
				<category><![CDATA[KYC]]></category>
		<category><![CDATA[Finserv]]></category>
		<guid isPermaLink="false">https://www.veriff.com/?post_type=kyc-article&#038;p=3500</guid>

					<description><![CDATA[<p>Rising costs, lengthy onboarding processes, and poor conversion rates are all issues that can arise if KYC processes are not carried out efficiently.&#160; Thankfully, KYC issues can be simple to overcome when the right processes and structures are put in place. To help you learn more about how to overcome common KYC issues and challenges,</p>
<p>The post <a rel="nofollow" href="https://www.veriff.com/kyc/learn/kyc-issues-and-challenges">KYC issues and challenges</a> appeared first on <a rel="nofollow" href="https://www.veriff.com">Veriff</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Rising costs, lengthy onboarding processes, and poor conversion rates are all issues that can arise if KYC processes are not carried out efficiently.&nbsp;</p>



<p>Thankfully, KYC issues can be simple to overcome when the right processes and structures are put in place. To help you learn more about how to overcome common KYC issues and challenges, we’ve put together this handy guide.</p>



<h2 class="wp-block-heading">Common challenges for KYC compliance</h2>



<p>Putting proper KYC processes in place is essential if you’re looking to ensure compliance with anti-money laundering directives.</p>



<p>However, when they’re creating AML and KYC processes, many companies are wasting huge sums of money and countless man hours because their processes are ineffective.</p>



<p>Common challenges faced by firms include:</p>



<ul class="wp-block-list">
<li>High onboarding costs</li>



<li>Low conversion rates</li>



<li>Lengthy onboarding processes</li>



<li>Poor record keeping</li>



<li>An inability to spot a change in circumstances</li>



<li>Wasting time and money on false positives</li>
</ul>



<h2 class="wp-block-heading">How can you prevent these?</h2>



<p>The easiest way to prevent any of these challenges arising is by using a class-leading&nbsp;<a href="https://www.veriff.com/product/aml-screening">AML and KYC compliance solution</a>. By enlisting the help of a piece of software such as this, you can automate much of the process and save on man hours. Plus, you can also verify the identity of your customers in as little as six seconds.</p>



<p>By using a dedicated piece of software, not only can you overcome KYC issues, but you can also show regulators that you take financial crime and compliance seriously. On top of this, you can also ensure that you’re only ever asking your customers for the information you actually need, so the process won’t appear burdensome.</p>



<h2 class="wp-block-heading">KYC compliance checklist</h2>



<p>Due to the importance of AML policies, a number of AML fundamentals exist that businesses must follow regardless of the jurisdictions they operate in.</p>



<p>These fundamentals work as forms of best practice and should form the basis of a KYC compliance checklist that you follow on a daily basis. These fundamentals include:</p>



<h3 class="wp-block-heading">Customer identification program (CIP)</h3>



<p>As part of your CIP, you must identify your customers and their financial background. This process will also help you monitor their financial activities once they’ve opened an account.&nbsp;&nbsp;</p>



<p>When onboarding your customers, you must ask them for several key pieces of personal information, including their full name, date of birth, and permanent address. The customer must also provide you with a copy of an identity document, so you can verify this information.</p>



<h3 class="wp-block-heading">Customer due diligence process (CDD)</h3>



<p>Once you’ve identified your customer, you must then calculate what level of risk this customer poses to your business. Depending on the customer, you can employ one of three levels of CDD. These are:</p>



<ul class="wp-block-list">
<li>Simplified Due Diligence (SDD)</li>



<li>Customer Due Diligence (CDD)</li>



<li>Enhanced Due Diligence (EDD)</li>
</ul>



<p>While customers who pose a low level of risk will be subjected to SDD as part of the onboarding process, those who pose a high level of risk (such as a politically exposed person) will be subjected to EDD processes.</p>



<h3 class="wp-block-heading">Ongoing monitoring</h3>



<p>Effective KYC processes don’t stop once a customer has successfully opened an account. Instead, you must monitor your customers on an ongoing basis. This will help you spot whether their risk level has changed or whether their activities are suspicious.</p>



<p>By continually screening your customers, you can keep an eye on their transactions and receive alerts if anything suspicious happens.</p>



<h2 class="wp-block-heading">Tips for overcoming KYC issues</h2>



<p>Although KYC issues can cause headaches for businesses, it is possible to overcome them with the correct planning and organization. Our top tips for overcoming KYC issues include:</p>



<h3 class="wp-block-heading">Put written policies in place</h3>



<p>AML regulations and KYC processes can be complex. Many of them also need to be followed to the letter. As a result, to make sure all staff members understand your processes and follow them correctly, you must put written policies in place. This way, all of your policies can be viewed by both staff members and regulators. Within your written policies, you should include information regarding:</p>



<ul class="wp-block-list">
<li>What your identification processes include</li>



<li>What reports you create</li>



<li>What regulations you’re currently complying with and how you ensure compliance</li>



<li>How you communicate with regulators</li>



<li>Your record retention policy</li>



<li>How regularly your policies are reviewed</li>



<li>Whether your policies have been independently audited</li>
</ul>



<h3 class="wp-block-heading">Employing a compliance officer</h3>



<p>On top of this, you should also employ an experienced AML compliance officer who can guide your AML and KYC efforts.</p>



<p>A compliance officer should help you put your AML program in place, resolve KYC issues, and regularly review compliance.</p>



<p>Overall, the role of an AML compliance officer is to take ownership over the system and ensure that processes are followed and updated. They must also ensure that reports are filed, training is correct, and that the system is running smoothly.</p>



<h3 class="wp-block-heading">Use a risk-based approach</h3>



<p>As we mentioned earlier, the way you approach KYC and due diligence should reflect the level of risk that your firm faces. Due to this, you should employ a risk-based approach to customer due diligence (CDD) rather than making each customer face the same checks. This way, you can ensure that your approach to KYC and compliance is appropriate and proportional.</p>



<p>By employing a risk-based approach to CDD, you will receive a number of benefits. For example, you can make sure that you’re meeting your compliance obligations.</p>



<p>However, a risk-based approach to CDD will also help you overcome a number of KYC issues. For example, you can lower costs by only paying for the checks you need. You’ll also improve your conversion rates because customers won’t be subjected to onerous checks.&nbsp;</p>



<h2 class="wp-block-heading">Speak with the KYC compliance experts at Veriff</h2>



<p>Here at Veriff, our&nbsp;<a href="https://www.veriff.com/product/aml-screening">AML and KYC compliance solution</a>&nbsp;can help you show regulators that you take financial crime and compliance seriously. It can also help you comply with regulations and fight financial crime.</p>



<p>If you’re interested in learning more about how you can meet your obligations while making the process as frictionless as possible for your customers, then&nbsp;<a href="https://www.veriff.com/contact-sales">talk to the KYC compliance experts at Veriff today</a>.&nbsp;</p>
<p>The post <a rel="nofollow" href="https://www.veriff.com/kyc/learn/kyc-issues-and-challenges">KYC issues and challenges</a> appeared first on <a rel="nofollow" href="https://www.veriff.com">Veriff</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Neobanks: How AI can turbocharge your KYC process</title>
		<link>https://www.veriff.com/kyc/learn/how-ai-can-turbocharge-your-kyc-process</link>
		
		<dc:creator><![CDATA[agustina.bustinduy@veriff.net]]></dc:creator>
		<pubDate>Wed, 21 Aug 2024 20:01:00 +0000</pubDate>
				<category><![CDATA[KYC]]></category>
		<category><![CDATA[Finserv]]></category>
		<guid isPermaLink="false">https://www.veriff.com/?post_type=kyc-article&#038;p=3495</guid>

					<description><![CDATA[<p>Maximize conversions while minimizing risk In traditional banking, a financial institution is required&#160; to prevent financial crimes and illegal activities, such as terrorism financing, by implementing practices to meet know your customer (KYC) requirements.KYC compliance involves verifying customers before granting access to everyday services like opening bank accounts, getting debit or credit cards.&#160; In financial</p>
<p>The post <a rel="nofollow" href="https://www.veriff.com/kyc/learn/how-ai-can-turbocharge-your-kyc-process">Neobanks: How AI can turbocharge your KYC process</a> appeared first on <a rel="nofollow" href="https://www.veriff.com">Veriff</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h2 class="wp-block-heading">Maximize conversions while minimizing risk</h2>



<p>In traditional banking, a financial institution is required&nbsp; to prevent financial crimes and illegal activities, such as terrorism financing, by implementing practices to meet know your customer (KYC) requirements.KYC compliance involves verifying customers before granting access to everyday services like opening bank accounts, getting debit or credit cards.&nbsp; In financial services, the need remains to<a target="_blank" href="https://www.veriff.com/blog/how-to-verify-user-identity" rel="noreferrer noopener">&nbsp;verify the identity</a>&nbsp;of would-be customers, but with the growth of the<a target="_blank" href="https://www.veriff.com/blog/what-is-a-digital-bank" rel="noreferrer noopener">&nbsp;digital bank</a>&nbsp;worldwide, institutions are looking for more innovative solutions to complete<a target="_blank" href="https://www.veriff.com/blog/enhanced-due-diligence-edd-in-the-kyc-process" rel="noreferrer noopener">&nbsp;enhanced due diligence</a>&nbsp;(EDD),<a target="_blank" href="https://www.veriff.com/blog/customer-due-diligence-for-banks" rel="noreferrer noopener">&nbsp;customer due diligence</a>&nbsp;(CDD), and other compliance measures.</p>



<p>Of course, alongside these developments, we are also seeing the rapid advancement of Artificial intelligence (AI) in the form of machine learning – the application of which promises to be transformative for many sectors. However, as well as being transformative in a positive sense – delivering automation, efficiency, increased productivity and cost reduction – it also brings enhanced risk. For financial services firms, that includes heightened security and fraud risks – and AI is making it easier for individuals to carry out identity fraud.</p>



<p>Neobanking is no exception. By analyzing huge volumes of digital data, automated decision engines can recognize patterns and progressively improve the speed and accuracy of processes. This kind of machine learning is already being used with great success by neobanks, both to improve fraud prevention and to deliver a better user experience. But they, too, also face the negative risks posed.</p>



<h2 class="wp-block-heading">What exactly are neobanks and how do they differ?</h2>



<p>Neobanks, sometimes referred to as “challenger banks,” are&nbsp;<a target="_blank" href="https://www.forbes.com/advisor/banking/what-is-fintech/" rel="noreferrer noopener">fintech</a>&nbsp;firms that offer apps, software and other technologies to streamline online customer experience (mobile / online banking) . These fintechs generally specialize in particular financial products, like checking and savings accounts. They also tend to be more agile and transparent than their megabank counterparts, even though many of them partner with such institutions to ensure their financial products.</p>



<p>In the U.S., these fintechs are more commonly referred to as neobanks. The term “challenger bank” was first popularized in the U.K. to refer to a number of fintech banking startups that emerged in the wake of the 2007-2009 financial crisis.</p>



<h2 class="wp-block-heading">Do neobanks face greater risks?</h2>



<p>Neobanks do come with certain risks that potential customers should be aware of:</p>



<h4 class="wp-block-heading">1. Regulatory and legal risks</h4>



<ul class="wp-block-list">
<li><strong>Regulatory environment</strong>: neobanks often operate under different regulatory frameworks compared to traditional banks. Some may not have the same level of regulatory oversight, which can affect their stability and customer protections.</li>



<li><strong>Licensing</strong>: some neobanks operate under partnerships with traditional banks, while others may have their own banking licenses. The level of protection can vary depending on the licensing arrangements.</li>
</ul>



<h3 class="wp-block-heading">2. Financial stability</h3>



<ul class="wp-block-list">
<li><strong>Profitability</strong>: many neobanks are not yet profitable and rely on venture capital funding. This can pose risks if they are unable to sustain operations or secure additional funding.</li>



<li><strong>Resilience to economic downturns</strong>: as newer institutions, neobanks might not have the same financial resilience as established banks, potentially making them more vulnerable during economic downturns.</li>
</ul>



<h3 class="wp-block-heading">3. Technology and security risks</h3>



<ul class="wp-block-list">
<li><strong>Cybersecurity</strong>: as digital-only platforms, neobanks are highly dependent on technology. They must maintain robust cybersecurity measures to protect against hacking, fraud, and data breaches.</li>



<li><strong>Technical issues</strong>: outages or technical issues can disrupt access to funds and services, causing inconvenience and potential financial losses for customers.</li>
</ul>



<h3 class="wp-block-heading">4. Customer support and service</h3>



<ul class="wp-block-list">
<li><strong>Limited physical presence</strong>: the absence of physical branches can be a drawback for customers who prefer face-to-face interactions for complex issues or concerns.</li>



<li><strong>Customer service quality</strong>: the quality and availability of customer support can vary, with some customers experiencing difficulties in resolving issues promptly.</li>
</ul>



<h3 class="wp-block-heading">5. Deposit insurance and fund protection</h3>



<ul class="wp-block-list">
<li><strong>Deposit insurance</strong>: it&#8217;s essential to verify whether deposits are insured and to what extent. In the U.S., for example, traditional banks are typically insured by the FDIC, but this may not be the case for all neobanks.</li>



<li><strong>Funds protection</strong>: understanding how your funds are protected in the event of the neobank&#8217;s failure is crucial. Some neobanks partner with traditional banks for deposit insurance, while others may have different arrangements.</li>
</ul>



<h3 class="wp-block-heading">6. Trust and reputation</h3>



<ul class="wp-block-list">
<li><strong>Reputation</strong>: as newer entities, neobanks may not have established a long track record of trust and reliability. Researching customer reviews and the bank&#8217;s history can provide insights into their reputation.</li>
</ul>



<div class="wp-block-group is-nowrap is-layout-flex wp-container-core-group-is-layout-ad2f72ca wp-block-group-is-layout-flex">
<div class="wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex">
<div class="wp-block-column is-layout-flow wp-block-column-is-layout-flow">
<h4 class="wp-block-heading">Fast decisions</h4>



<p>A 98% check automation rate gets customers through in about 6 seconds.</p>
</div>



<div class="wp-block-column is-layout-flow wp-block-column-is-layout-flow">
<h4 class="wp-block-heading">Simple experience</h4>



<p>Real-time end user feedback and fewer steps gets 95% of users through on the first try.</p>
</div>



<div class="wp-block-column is-layout-flow wp-block-column-is-layout-flow">
<h4 class="wp-block-heading">Document coverage</h4>



<p>An unmatched 12K+, and growing, government-issued IDs are covered.</p>
</div>
</div>
</div>



<div class="wp-block-group is-nowrap is-layout-flex wp-container-core-group-is-layout-ad2f72ca wp-block-group-is-layout-flex">
<div class="wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex">
<div class="wp-block-column is-layout-flow wp-block-column-is-layout-flow">
<h4 class="wp-block-heading">More conversions</h4>



<p>Up to 30% more customer conversions with superior accuracy and user experience.</p>
</div>



<div class="wp-block-column is-layout-flow wp-block-column-is-layout-flow">
<h4 class="wp-block-heading">Better fraud detection</h4>



<p>Veriff’s data-driven fraud detection is consistent, auditable, and reliably detects fraudulent forms of identification.</p>
</div>



<div class="wp-block-column is-layout-flow wp-block-column-is-layout-flow">
<h4 class="wp-block-heading">Scalability embedded</h4>



<p>Veriff’s POA can grow with your company’s needs and keep up with times of increased user demand.</p>
</div>
</div>
</div>



<section class="general-section promo-card block-content alignfull   size-default heading-white text-white" style="background:#03282C no-repeat; text-align: left !important; margin-top: 50px; margin-bottom: 50px; padding: 100px 0 100px;" id="block_a312234248805078bde482033ea23d16">
            <figure class="icon-left-top-col">
        <img decoding="async" src="https://spcdn.shortpixel.ai/spio/ret_img,q_cdnize,to_webp,s_webp/www.veriff.com/wp-content/themes/veriff/img/img-top-left.png" alt="">
    </figure>
    <div class="container" id="" data-aos-duration="800" data-aos="fade-up">
                <h3>Talk to us</h3>        <p>Our identity verification experts are ready to help build you a solution that gets more honest customers onboarded faster, and more securely, than ever before</p>
        		<div class="content-buttons buttons-justification-star">
												<a class="btn-site btn-primary btn-mode-dark " target="" href="https://www.veriff.com/contact-sales">
						<span class="btn-text">Talk to us							<span><img decoding="async" src="https://spcdn.shortpixel.ai/spio/ret_img,q_cdnize,to_webp,s_webp/www.veriff.com/wp-content/themes/veriff/assets/img/buttonarrow.svg" class="button-arrow" alt="" aria-hidden="true"></span>
						</span>
					</a>
									</div>
	    </div>
</section>



<h2 class="wp-block-heading">Speak with the experts at Veriff</h2>



<p>If you run a financial institution, then having proper anti-money laundering customer due diligence processes in place is vital. Thankfully, our<a href="https://www.veriff.com/product/identity-verification">&nbsp;IDV</a>&nbsp;&amp;&nbsp;<a href="https://www.veriff.com/product/aml-screening">AML Screening&nbsp;</a>solution can help you fight financial crime and show regulators that you take financial crime and compliance seriously.</p>



<p><a href="https://www.veriff.com/product/proof-of-address">Veriff’s Proof of Address produc</a>t has been bolstered with additional data extraction capabilities to work seamlessly alongside our product ecosystem. The updates to POA will further reduce user friction, lower costs, and continue to comply with regulators. Ensure your customers aren’t waiting hours, or even days, for approval.</p>



<p>If you&#8217;d like to hear more about how our solution can help you, then talk to our compliance experts today.</p>



<h2 class="wp-block-heading">Improving accuracy</h2>



<p>IDV is a critical component in the KYC process, mandated by regulators to combat money laundering. The best IDV systems compare live<a target="_blank" href="https://www.veriff.com/blog/what-is-biometric-data" rel="noreferrer noopener">&nbsp;biometric data</a>&nbsp;from a selfie with stored biometric data to authenticate customer sessions. By incorporating machine learning algorithms programmed to identify patterns into this kind of automated IDV solution, the data collected can be used to adjust and improve the accuracy of its decision-making over time.&nbsp;</p>



<p>Because machine learning makes predictions based on previous experience, including previous fraud schemes, novelty is a potential blind spot for the technology. The larger and more current the dataset, therefore, the lower the risk that an automated decision engine will make a mistake. For identity verification, for example, access to a dataset that includes plentiful biometric data for a range of ethnicities and ages is important in minimizing potential bias. In addition, cross-comparing verification sessions based on device, network and customer behavior can provide a greater richness and variety to the data a decision engine uses to learn and improve its decision making.</p>



<p>By analyzing huge volumes of digital data, automated decision engines can recognize patterns and progressively improve the speed and accuracy of processes. This kind of machine learning is already being used with great success by neobanks – and by Veriff.</p>


<div class="space-after-shadow">
    <section class="general-section client-testimonial alignfull   size-default heading-dark text-dark" style="background:#fff no-repeat; text-align: left !important; margin-top: 0px; margin-bottom: 0px; padding: 50px 0 50px;" id="block_2899282daf7bd94418cc1e4ed61f8a33">
                        <div class="container" id="" data-aos-duration="800" data-aos="fade-up">
            <div class="client-testimonial-content">
                <div class="row-detail-content">
                    <figure class="icon-dots-col">
                        <img decoding="async" src="https://spcdn.shortpixel.ai/spio/ret_img,q_cdnize,to_webp,s_webp/www.veriff.com/wp-content/themes/veriff/assets/img/quote.svg" alt="quote" title="quote">
                    </figure>
                    <div class="content-right-testimonial">
                        <p>IDV is a critical component in the KYC process, mandated by regulators to combat money laundering. The best IDV systems compare live biometric data from a selfie with stored biometric data to authenticate customer sessions. By incorporating machine learning algorithms programmed to identify patterns into this kind of automated IDV solution, the data collected can be used to adjust and improve the accuracy of its decision-making over time.</p>
                    </div>
                </div>
                <div class="row-detail-position">
                    
                    <div class="info-author-col">
                        <p class="author-position-inner mb-0">
                                                            <strong>Maksim Afanasjev</strong>
                                                                                        <span>Staff Product Manager</span>
                                                                                        <span></span>
                                                    </p>
                    </div>
                </div>
            </div>
        </div>
    </section>
</div>


<section class="general-section promo-card block-content alignfull   size-default heading-white text-white" style="background:#03282C no-repeat; text-align: left !important; margin-top: 50px; margin-bottom: 50px; padding: 100px 0 100px;" id="block_204d8ff614811daca498415a8add7e42">
            <figure class="icon-left-top-col">
        <img decoding="async" src="https://spcdn.shortpixel.ai/spio/ret_img,q_cdnize,to_webp,s_webp/www.veriff.com/wp-content/themes/veriff/img/img-top-left.png" alt="">
    </figure>
    <div class="container" id="" data-aos-duration="800" data-aos="fade-up">
                <h3>Get more details</h3>        <p>Discover more about how IDV is powering Neobank growth and customer acquisition.</p>
        		<div class="content-buttons buttons-justification-star">
												<a class="btn-site btn-primary btn-mode-dark " target="" href="https://www.veriff.com/industry/neobanks">
						<span class="btn-text">Learn more							<span><img decoding="async" src="https://spcdn.shortpixel.ai/spio/ret_img,q_cdnize,to_webp,s_webp/www.veriff.com/wp-content/themes/veriff/assets/img/buttonarrow.svg" class="button-arrow" alt="" aria-hidden="true"></span>
						</span>
					</a>
									</div>
	    </div>
</section>
<p>The post <a rel="nofollow" href="https://www.veriff.com/kyc/learn/how-ai-can-turbocharge-your-kyc-process">Neobanks: How AI can turbocharge your KYC process</a> appeared first on <a rel="nofollow" href="https://www.veriff.com">Veriff</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Anti-money laundering customer due diligence</title>
		<link>https://www.veriff.com/kyc/learn/anti-money-laundering-customer-due-diligence</link>
		
		<dc:creator><![CDATA[agustina.bustinduy@veriff.net]]></dc:creator>
		<pubDate>Wed, 14 Aug 2024 19:52:00 +0000</pubDate>
				<category><![CDATA[KYC]]></category>
		<guid isPermaLink="false">https://www.veriff.com/?post_type=kyc-article&#038;p=3486</guid>

					<description><![CDATA[<p>Just as an employer must thoroughly vet a candidate, financial services businesses must also ask questions of prospective customers before they allow them to open an account. This helps mitigate fraud and lower money laundering risks. The process is known as customer due diligence (CDD) – and it should be an essential part of any&#160;anti-money</p>
<p>The post <a rel="nofollow" href="https://www.veriff.com/kyc/learn/anti-money-laundering-customer-due-diligence">Anti-money laundering customer due diligence</a> appeared first on <a rel="nofollow" href="https://www.veriff.com">Veriff</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Just as an employer must thoroughly vet a candidate, financial services businesses must also ask questions of prospective customers before they allow them to open an account. This helps mitigate fraud and lower money laundering risks. The process is known as customer due diligence (CDD) – and it should be an essential part of any<a target="_blank" href="https://www.veriff.com/blog/what-are-anti-money-laundering-regulations-aml" rel="noreferrer noopener">&nbsp;anti-money laundering (AML</a>) strategy.&nbsp;</p>



<p>Customer due diligence involves taking steps to identify a customer and verify that they are who they claim to be. Typically, this means a business must gather essential information, such as the customer&#8217;s name, residential address, and date of birth. The business then requests an official government document, like a driver´s licence, to confirm and validate the identity. Additionally, customer due diligence is about understanding the level of risk a potential customer poses and determining whether this risk aligns with the organization&#8217;s risk appetite.</p>



<h2 class="wp-block-heading">Your anti-money laundering responsibilities</h2>



<p>Customer due diligence is a foundation of know your customer (KYC) processes and AML strategies. CDD requires companies to understand who their customers are, their financial behaviors, and what kind of money laundering or terrorism financing risk they present. All Financial Action Task Force (FATF) member states must implement CDD methods.</p>



<p>Financial institutions have several responsibilities regarding AML, including devising a comprehensive&nbsp;<a target="_blank" href="https://veriff.com/blog/what-is-anti-money-laundering" rel="noreferrer noopener">anti-money laundering</a>&nbsp;policy, which we&#8217;ll cover in detail later.&nbsp;</p>



<p>However, there is also a number of important reasons why financial institutions should carry out customer due diligence regardless. In fact, carrying out appropriate customer due diligence ensures:</p>



<ul class="wp-block-list">
<li>The organization remains compliant with the regulations and laws of the regions or markets they are operating in</li>



<li>The customer attempting to access the service is exactly who they&#8217;re claiming to be</li>



<li>Customers are not trying to commit fraud,<a href="https://www.veriff.com/blog/what-is-art-money-laundering" target="_blank" rel="noreferrer noopener">&nbsp;launder money</a>, or finance terrorism</li>
</ul>



<h2 class="wp-block-heading">What are the key CDD requirements in AML?</h2>



<p>The four key customer due diligence requirements typically include:</p>



<ul class="wp-block-list">
<li>Identity Verification: Financial institutions must verify the identity of their customers&nbsp; by collecting reliable, independent source documents, data, or information.</li>



<li>Risk Assessment: Banks and financial entities are required to assess the risk level associated with each customer, which may be influenced by the customer’s background, type of business activity, the nature of the business relationship, and the country of operation.</li>



<li>Ongoing Monitoring: This involves regular scrutiny of transactions and accounts to detect any unusual or suspicious activities that deviate from the customer&#8217;s profile or business patterns.</li>



<li>Beneficial Ownership: For legal entity clients, institutions must take steps to understand the ownership and control structure of the customer, identifying the ultimate beneficial owners.</li>
</ul>



<section class="general-section promo-card block-content alignfull   size-default heading-white text-white" style="background:#03282C no-repeat; text-align: left !important; margin-top: 50px; margin-bottom: 50px; padding: 100px 0 100px;" id="block_855bc08c45a43324fae1c2a4f5e5c9b3">
            <figure class="icon-left-top-col">
        <img decoding="async" src="https://spcdn.shortpixel.ai/spio/ret_img,q_cdnize,to_webp,s_webp/www.veriff.com/wp-content/themes/veriff/img/img-top-left.png" alt="">
    </figure>
    <div class="container" id="" data-aos-duration="800" data-aos="fade-up">
                <h3>Don’t compromise</h3>        <p>Automate AML screening with leading technology and create a user journey that gets you more real customers. Get in touch with us to get started.</p>
        		<div class="content-buttons buttons-justification-star">
												<a class="btn-site btn-primary btn-mode-dark " target="" href="https://www.veriff.com/contact/">
						<span class="btn-text">Talk to us							<span><img decoding="async" src="https://spcdn.shortpixel.ai/spio/ret_img,q_cdnize,to_webp,s_webp/www.veriff.com/wp-content/themes/veriff/assets/img/buttonarrow.svg" class="button-arrow" alt="" aria-hidden="true"></span>
						</span>
					</a>
									</div>
	    </div>
</section>



<h3 class="wp-block-heading">Enhanced due diligence measures and when to use them</h3>



<p><a target="_blank" href="https://www.veriff.com/blog/enhanced-due-diligence-edd-in-the-kyc-process" rel="noreferrer noopener">Enhanced due diligence</a>&nbsp;(EDD) is a KYC process that highlights risks that cannot be detected by the usual AML customer due diligence processes.</p>



<p>EDD goes beyond CDD. It looks to establish a higher level of identity assurance and accurately evaluates the risk category of the customer. EDD measures vary from CDD measures in the following ways:</p>



<ul class="wp-block-list">
<li>They&#8217;re more rigorous and robust, and they require significantly more evidence and detailed information from the customer</li>



<li>The entire EDD process must be documented in detail, and regulators must be provided with immediate access to EDD reports</li>



<li>EDD requirements call for “reasonable assurance” when calculating KYC risk. This means staff members must follow the necessary research steps and exercise professional skills when reaching a judgment</li>



<li>Special attention must be given to politically exposed persons (PEPs)</li>
</ul>



<p>EDD measures should be used when dealing with high-risk or high-net-worth customers and large transactions. This is because these transactions and customers pose greater risks to the financial sector &#8211; and are therefore heavily regulated and monitored.</p>



<p>By employing EDD measures for high-risk transactions and individuals, you can avoid fines and unwanted additional regulatory scrutiny. However, using these measures also provides you with other benefits. For example, by capturing more information from your customers, you can offer them bespoke solutions that better suit their needs. On top of this, by properly screening your customers, you can deter financial crime and enhance your own brand reputation by preventing dirty money from accessing your ecosystem.</p>



<h2 class="wp-block-heading">The importance of risk-based CDD in an AML policy</h2>



<p>Guidance from the Financial Action Task Force (FATF) states that companies should implement risk-based CDD measures as part of their AML due diligence policies. These measures should reflect the specific level of AML/CFT risk that individual customers present.</p>



<p>Risk-based customer due diligence is a way for companies to balance their compliance obligations with their budget and their resource requirements. Plus, by ensuring that checks aren&#8217;t too onerous, companies can ensure that the customer experience is preserved.</p>



<p>With a risk-based approach to CDD, a business can deploy the faster and more efficient CDD for low-risk customers, and the more enhanced due diligence for high-risk customers. An effective CDD process for customer onboarding will follow all the following steps:</p>



<ul class="wp-block-list">
<li>Prior to starting a relationship with the new customer, a company will establish the identity and business activities of the individual involved</li>



<li>Once a customer has been identified and their<a href="https://www.veriff.com/blog/what-is-identity-verification" target="_blank" rel="noreferrer noopener">&nbsp;identity has been verified</a>, the company will categorize the level of<a href="https://www.veriff.com/blog/7-high-risk-customer-types-and-how-to-identify-them" target="_blank" rel="noreferrer noopener">&nbsp;risk this customer</a>&nbsp;poses. This should then be documented, so it can be used for future regulatory checks</li>



<li>Now that a customer&#8217;s risk category has been determined, the company will determine whether EDD measures are needed. If so, these should be carried out before a customer accesses a product or service</li>
</ul>



<p>These checks are simple to run when you enlist the help of an AML and<a target="_blank" href="https://www.veriff.com/blog/understanding-kyc-law-and-how-to-meet-compliance-regulations" rel="noreferrer noopener">&nbsp;KYC compliance</a>&nbsp;solution. Thankfully, with the help of our Identity Verification &amp; AML screening tool, you will find it easy to verify exactly who your customers are and fight fraud.</p>



<p>Once onboarded, you can also monitor your customer on an ongoing basis and get notified if anything changes.</p>



<h2 class="wp-block-heading">What are the key CDD requirements in AML?</h2>



<p>The four key customer due diligence requirements typically include:</p>



<ul class="wp-block-list">
<li>Identity Verification: Financial institutions must verify the identity of their customers&nbsp; by collecting reliable, independent source documents, data, or information.</li>



<li>Risk Assessment: Banks and financial entities are required to assess the risk level associated with each customer, which may be influenced by the customer’s background, type of business activity, the nature of the business relationship, and the country of operation.</li>



<li>Ongoing Monitoring: This involves regular scrutiny of transactions and accounts to detect any unusual or suspicious activities that deviate from the customer&#8217;s profile or business patterns.</li>



<li>Beneficial Ownership: For legal entity clients, institutions must take steps to understand the ownership and control structure of the customer, identifying the ultimate beneficial owners.</li>
</ul>



<h2 class="wp-block-heading">Enhanced due diligence measures and when to use them</h2>



<p><a target="_blank" href="https://www.veriff.com/blog/enhanced-due-diligence-edd-in-the-kyc-process" rel="noreferrer noopener">Enhanced due diligence</a>&nbsp;(EDD) is a KYC process that highlights risks that cannot be detected by the usual AML customer due diligence processes.</p>



<p>EDD goes beyond CDD. It looks to establish a higher level of identity assurance and accurately evaluates the risk category of the customer. EDD measures vary from CDD measures in the following ways:</p>



<ul class="wp-block-list">
<li>They&#8217;re more rigorous and robust, and they require significantly more evidence and detailed information from the customer</li>



<li>The entire EDD process must be documented in detail, and regulators must be provided with immediate access to EDD reports</li>



<li>EDD requirements call for “reasonable assurance” when calculating KYC risk. This means staff members must follow the necessary research steps and exercise professional skills when reaching a judgment</li>



<li>Special attention must be given to politically exposed persons (PEPs)</li>
</ul>



<p>EDD measures should be used when dealing with high-risk or high-net-worth customers and large transactions. This is because these transactions and customers pose greater risks to the financial sector &#8211; and are therefore heavily regulated and monitored.</p>



<p>By employing EDD measures for high-risk transactions and individuals, you can avoid fines and unwanted additional regulatory scrutiny. However, using these measures also provides you with other benefits. For example, by capturing more information from your customers, you can offer them bespoke solutions that better suit their needs. On top of this, by properly screening your customers, you can deter financial crime and enhance your own brand reputation by preventing dirty money from accessing your ecosystem.</p>



<h2 class="wp-block-heading">The importance of risk-based CDD in an AML policy</h2>



<p>Guidance from the Financial Action Task Force (FATF) states that companies should implement risk-based CDD measures as part of their AML due diligence policies. These measures should reflect the specific level of AML/CFT risk that individual customers present.</p>



<p>Risk-based customer due diligence is a way for companies to balance their compliance obligations with their budget and their resource requirements. Plus, by ensuring that checks aren&#8217;t too onerous, companies can ensure that the customer experience is preserved.</p>



<p>With a risk-based approach to CDD, a business can deploy the faster and more efficient CDD for low-risk customers, and the more enhanced due diligence for high-risk customers. An effective CDD process for customer onboarding will follow all the following steps:</p>



<ul class="wp-block-list">
<li>Prior to starting a relationship with the new customer, a company will establish the identity and business activities of the individual involved</li>



<li>Once a customer has been identified and their<a href="https://www.veriff.com/blog/what-is-identity-verification" target="_blank" rel="noreferrer noopener">&nbsp;identity has been verified</a>, the company will categorize the level of<a href="https://www.veriff.com/blog/7-high-risk-customer-types-and-how-to-identify-them" target="_blank" rel="noreferrer noopener">&nbsp;risk this customer</a>&nbsp;poses. This should then be documented, so it can be used for future regulatory checks</li>



<li>Now that a customer&#8217;s risk category has been determined, the company will determine whether EDD measures are needed. If so, these should be carried out before a customer accesses a product or service</li>
</ul>



<p>These checks are simple to run when you enlist the help of an AML and<a target="_blank" href="https://www.veriff.com/blog/understanding-kyc-law-and-how-to-meet-compliance-regulations" rel="noreferrer noopener">&nbsp;KYC compliance</a>&nbsp;solution. Thankfully, with the help of our Identity Verification &amp; AML screening tool, you will find it easy to verify exactly who your customers are and fight fraud.</p>



<p>Once onboarded, you can also monitor your customer on an ongoing basis and get notified if anything changes.</p>



<h2 class="wp-block-heading">Create and follow an AML policy</h2>



<p>The exact AML due diligence policy you&#8217;ll need to create will depend on the type of business you run and the regulations and laws in the regions or markets where you operate. For example, in the EU, companies must comply with the&nbsp;<a target="_blank" href="https://veriff.com/blog/aml-compliance-amld5" rel="noreferrer noopener">Anti-Money Laundering Directive</a>. However, firms in the US must make sure they comply with the Bank Secrecy Act.</p>



<p>Regardless, all<a target="_blank" href="https://www.veriff.com/blog/what-is-aml-compliance" rel="noreferrer noopener">&nbsp;AML compliance</a>&nbsp;policies contain similar elements. To ensure compliance, your AML due diligence policy should contain:</p>



<ul class="wp-block-list">
<li>An effective system that helps you identify and report suspicious activity</li>



<li>An ability to identify high-risk customers</li>



<li>A system for monitoring customers on an ongoing basis</li>



<li>A compliance officer who leads your efforts</li>



<li>A series of internal practices that help you meet regulatory compliance</li>



<li>Accurate risk assessments</li>



<li>Provisions for an independent audit</li>



<li>Adequate training for staff members</li>
</ul>



<p>Let&#8217;s look at some of these factors in greater detail.</p>



<h2 class="wp-block-heading">Ongoing monitoring</h2>



<p>A customer&#8217;s risk profile will likely change during their time with your business – as they move jobs, change locations, and earn/spend more money. As a result, you need to monitor each customer on an ongoing basis. After all, if something changes, then you need to be aware before they begin to exploit your business.</p>


<div class="space-after-shadow">
    <section class="general-section client-testimonial alignfull   size-default heading-dark text-dark" style="background:#fff no-repeat; text-align: left !important; margin-top: 0px; margin-bottom: 0px; padding: 50px 0 50px;" id="block_5bd0d056ba7f04db1955a6353a061dff">
                        <div class="container" id="" data-aos-duration="800" data-aos="fade-up">
            <div class="client-testimonial-content">
                <div class="row-detail-content">
                    <figure class="icon-dots-col">
                        <img decoding="async" src="https://spcdn.shortpixel.ai/spio/ret_img,q_cdnize,to_webp,s_webp/www.veriff.com/wp-content/themes/veriff/assets/img/quote.svg" alt="quote" title="quote">
                    </figure>
                    <div class="content-right-testimonial">
                        <p>A customer&#8217;s risk profile will likely change during their time with your business – as they move jobs, change locations, and earn/spend more money. As a result, you need to monitor each customer on an ongoing basis. After all, if something changes, then you need to be aware before they begin to exploit your business.</p>
                    </div>
                </div>
                <div class="row-detail-position">
                    
                    <div class="info-author-col">
                        <p class="author-position-inner mb-0">
                                                            <strong>Maksim Afanasjev</strong>
                                                                                                                    <span>Staff Product Manager</span>
                                                    </p>
                    </div>
                </div>
            </div>
        </div>
    </section>
</div>


<h2 class="wp-block-heading">Risk assessments</h2>



<p>You should also regularly assess the AML risk that&#8217;s associated with your business. There&#8217;s no prescribed way of doing this, and you can decide for yourself how you carry out the risk assessment. However, you should document the risk assessment and update it regularly.</p>



<p>The complexity of your risk assessment will depend on the size and structure of your business, the range of activities your business carries out, and the nature of the products and services it supplies.</p>



<p>When assessing the risks that apply to your business, consider the following factors:</p>



<ul class="wp-block-list">
<li>The types of customers you have</li>



<li>Where you and your customers are based</li>



<li>The behavior of your customers</li>



<li>How customers come to your business</li>



<li>The products you sell or the services you offer</li>



<li>Your delivery channels and payment processes, for example, cash over the counter, electronic transfers, or wire transfers</li>



<li>Where the funds of your customers come from or go to</li>
</ul>



<p>Once you&#8217;ve carried out your AML risk assessment, you need to put policies, controls, and procedures in place to reduce any money laundering risks that you&#8217;ve identified. You also need to monitor your business on an ongoing basis to make sure your controls are effective.</p>



<p>When appropriate, you should also get your AML processes, procedures, and risk assessments independently audited to ensure that there aren&#8217;t any weaknesses.&nbsp;&nbsp;</p>



<h2 class="wp-block-heading">Record keeping</h2>



<p>Keep a record of all anti-money laundering customer due diligence measures that you carry out, including:</p>



<ul class="wp-block-list">
<li>Customer identification documents that you&#8217;ve obtained</li>



<li>Risk assessments you&#8217;ve carried out</li>



<li>Your policies, controls, and procedures</li>



<li>Staff training records</li>
</ul>



<p>By keeping records, you&#8217;ll be able to demonstrate law enforcement officials and regulators that you have complied with regulations. If you&#8217;re audited or there&#8217;s an investigation into one of your customers, you&#8217;ll be expected to hand over all this information promptly.</p>



<p>As part of this process, it&#8217;s vital that you develop and implement internal guidelines regarding information sharing within your organization. You should assign clear roles and report any suspicious activities immediately.</p>



<h2 class="wp-block-heading">Transaction reporting</h2>



<p>Depending on the exact nature of your business, you may need to monitor customer transactions on an ongoing basis. This way, you can see whether a customer&#8217;s activity is consistent with their risk profile. If it isn&#8217;t, you&#8217;ll need to report the change in activity immediately.</p>



<p>In the US, for example, if a customer attempts a currency transaction of more than $10,000, then a bank must file a currency transaction report (CTR). And, if a bank believes that a customer&#8217;s activity is suspicious, then it must file a suspicious activity report (SAR).</p>



<p>This means you must have the ability to handle and quickly expose activities related to money laundering, such as finding fake data or abnormally big sums of money deposited into a particular account. A system or a piece of software can help you with this. Some of these systems can also file reports automatically.</p>



<h2 class="wp-block-heading">Appoint an AML compliance officer</h2>



<p>To oversee your AML policies and ensure that you&#8217;re compliant with latest regulations, appoint an AML compliance officer. This individual will be responsible for overseeing the development and implementation of your AML program –&nbsp; to ensure that the institution is not exposed to criminal risk and does not inadvertently facilitate financial crime.</p>



<p>The AML compliance officer is also responsible for ensuring that employees are aware of their company&#8217;s AML policy and that they have received training about this. Training is particularly important in departments where staff come into direct contact with clients, as improved knowledge gives them the insight required to spot suspicious activities.</p>



<h2 class="wp-block-heading">Speak with the experts at Veriff</h2>



<p>If you run a financial institution, then having proper anti-money laundering customer due diligence processes in place is vital. Thankfully, our&nbsp;<a target="_blank" href="https://www.veriff.com/product/identity-verification" rel="noreferrer noopener">IDV</a>&nbsp;&amp;&nbsp;<a target="_blank" href="https://veriff.com/product/aml-screening" rel="noreferrer noopener">AML Screening solution</a>&nbsp;can help you fight financial crime and show regulators that you take financial crime and compliance seriously.</p>



<p><a target="_blank" href="https://www.veriff.com/product/proof-of-address-1" rel="noreferrer noopener">Veriff’s Proof of Address&nbsp;</a>product has been bolstered with additional data extraction capabilities to work seamlessly alongside our product ecosystem. The updates to POA will further reduce user friction, lower costs, and continue to comply with regulators. Ensure your customers aren’t waiting hours, or even days, for approval.</p>



<p>If you&#8217;d like to hear more about how our solution can help you, then&nbsp;<a target="_blank" href="https://veriff.com/contact-sales" rel="noreferrer noopener">talk to our compliance experts today</a>.</p>
<p>The post <a rel="nofollow" href="https://www.veriff.com/kyc/learn/anti-money-laundering-customer-due-diligence">Anti-money laundering customer due diligence</a> appeared first on <a rel="nofollow" href="https://www.veriff.com">Veriff</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Crypto KYC and blockchain</title>
		<link>https://www.veriff.com/kyc/learn/crypto-kyc-and-blockchain</link>
		
		<dc:creator><![CDATA[agustina.bustinduy@veriff.net]]></dc:creator>
		<pubDate>Thu, 04 Aug 2022 19:55:00 +0000</pubDate>
				<category><![CDATA[Crypto]]></category>
		<category><![CDATA[KYC]]></category>
		<guid isPermaLink="false">https://www.veriff.com/?post_type=kyc-article&#038;p=3487</guid>

					<description><![CDATA[<p>As the cryptocurrency industry continues to grow and mature, businesses in the industry have been asked to implement&#160;KYC processes&#160;similar to those adopted by&#160;financial services businesses.&#160; In this guide, we’ll cover what these crypto KYC processes involve, why they need to be implemented, and the benefits they provide.&#160; What’s the role of KYC in crypto? Cryptocurrency</p>
<p>The post <a rel="nofollow" href="https://www.veriff.com/kyc/learn/crypto-kyc-and-blockchain">Crypto KYC and blockchain</a> appeared first on <a rel="nofollow" href="https://www.veriff.com">Veriff</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>As the cryptocurrency industry continues to grow and mature, businesses in the industry have been asked to implement&nbsp;<a href="https://www.veriff.com/product/kyc-onboarding">KYC processes&nbsp;</a>similar to those adopted by&nbsp;<a href="https://www.veriff.com/industry/fintech">financial services businesses.&nbsp;</a></p>



<p>In this guide, we’ll cover what these crypto KYC processes involve, why they need to be implemented, and the benefits they provide.&nbsp;</p>



<h2 class="wp-block-heading">What’s the role of KYC in crypto?</h2>



<p>Cryptocurrency transactions between users are generally anonymous and take place in seconds. Due to the speed of the transactions and the anonymity provided, criminals sometimes use cryptocurrencies in an attempt to evade conventional controls relating to money laundering.&nbsp;&nbsp;</p>



<p>However, global regulators are beginning to pay closer attention to crypto transactions. Now, crypto exchanges and wallet providers are being asked to address the anonymity concerns associated with cryptocurrency transactions by implementing suitable know your customer (KYC) processes.</p>



<p>Crypto KYC is the first step in the anti-money laundering (AML) due diligence process. When a financial institution such as a crypto exchange onboards a new customer, they must use KYC processes in order to identify and verify the customer’s identity. In carrying out the process, they must also assess the customer’s risk profile and the nature of the business relationship.</p>



<h2 class="wp-block-heading">Why do crypto exchanges require KYC?</h2>



<p>KYC is now mandatory for most crypto exchanges and crypto wallet providers because they’re defined as MSBs (money service businesses) under federal regulations in the US.</p>



<p>It’s thought that enforcing crypto KYC compliance will help tackle malicious activity adjacent to the crypto space, such as ransomware attacks. At present, attackers are able to leverage the anonymity provided by decentralized cryptocurrencies to evade detection.</p>



<p>On top of this, regulators and industry leaders also hope that the introduction of crypto KYC processes will help improve the crypto sector’s public image. This is because stronger compliance procedures could help crypto shed its perceived association with money laundering and other criminal enterprises.</p>



<h2 class="wp-block-heading">The challenge for KYC in crypto</h2>



<p>By its very nature, the crypto industry is prone to problems regarding KYC. After all, the blockchain and decentralized services as a whole have been designed specifically to promote anonymity and to shun central authorities.</p>



<p>Due to this, many crypto firms have no idea who their customers are. Plus, many crypto buyers and traders have traditionally prized their privacy and have no desire to share their personal data with either crypto providers or the government. Instead, they feel that KYC checks are intrusive and unnecessary during the onboarding process.</p>



<p>However, in recent years, regulators have successfully convinced many of the world’s largest crypto firms that the current situation is unacceptable. Faced with the prospect of huge penalties and fines, even the most reluctant crypto firms have been compelled to introduce crypto KYC measures. This is partially because companies who have failed to implement effective crypto KYC safeguards have faced fines in excess of $100 million.</p>



<p>On top of this, the crypto market remains in flux. After all, although reputable crypto firms have now implemented KYC measures, it remains possible for investors to buy crypto without going through KYC processes. However, these exchanges are incredibly risky to use.</p>



<p>Similarly, around the world, crypto KYC measures vary. For example, in the US, FinCEN requires cryptocurrency exchanges to use KYC standards and also practice anti-money laundering measures to achieve regulatory compliance. However, in the EU, standards are not currently as high.</p>



<h2 class="wp-block-heading">How does KYC and blockchain overlap?</h2>



<p>Some experts in the crypto space believe that successfully incorporating KYC into blockchain platforms would be a positive change. This is because using blockchain technology for KYC would provide:</p>



<ul class="wp-block-list">
<li>Greater operational efficiency</li>



<li>Real time and up-to-date customer data</li>



<li>Immutability and transparency</li>
</ul>



<p>On top of this, blockchain technology could also offer regulators a better understanding of how customers have been onboarded. If all actions by financial institutions are fully recorded and tracked, all activity data will be fully auditable. This information would also help regulators to better understand customer activity.</p>



<p>Plus, by using blockchain technology for crypto KYC, financial institutions will also be able to improve the customer experience by making processes more timely and efficient.</p>



<h2 class="wp-block-heading">How to be KYC compliant in crypto</h2>



<p>Now crypto businesses are regulated as financial institutions, they must integrate KYC processes into their anti-money laundering programs. In doing so, they must take appropriate steps to:</p>



<ul class="wp-block-list">
<li>Collect appropriate personally identifiable information (PII) from the customer</li>



<li>Verify the identity of the customer</li>



<li> Acquire a better understanding of the customer’s activities</li>



<li>Determine the probability that the customer poses a money laundering risk</li>
</ul>



<p>To do this, most crypto exchanges and wallet providers will follow these steps:</p>



<ol class="wp-block-list">
<li><strong>Step one:</strong> Collect the customer’s PII, including their full name, date of birth, and address</li>



<li><strong>Step two:</strong> Compare this information to a government-issued document, such as a passport or driving license. During this step of the process, the business must also verify the authenticity of the government-issued document</li>



<li><strong>Step three:</strong> Ask the customer for a selfie. This is then used to verify that the person who is providing the information is the person who is pictured on the government-issued document</li>



<li><strong>Step four:</strong> Verify the customer’s identity against official databases that contain information on politically exposed persons (PEP) and sanctioned individuals</li>
</ol>



<p>In carrying out these steps, crypto businesses can determine the risk of money laundering and financial crime involving virtual currencies for each client. If required, they can then carry out additional due diligence checks. If the customer passes these checks, they can then be allowed to access the service.</p>



<p>However, the crypto KYC process doesn’t end when a customer has been successfully onboarded. This is because the customer must also be monitored on an ongoing basis. This is to ensure that any suspicious transactions can be spotted and, if necessary, reported to authorities.</p>



<h2 class="wp-block-heading">Benefits of KYC for crypto</h2>



<p>Although there’s some opposition to KYC in the crypto space, the process actually provides businesses with a number of benefits, including:</p>



<h3 class="wp-block-heading">Improved customer transparency and trust</h3>



<p>Crypto KYC can increase transparency and trust among customers. This is because, when all user identities are verified, customers will feel confident that their crypto exchange is taking proactive and preventive measures to protect their account and their crypto. As a result, they’re more likely to continue using the service because they trust it.</p>



<h3 class="wp-block-heading">Reduced risk for money laundering</h3>



<p>When all identities are verified and crypto exchanges know their customers, the risk of money laundering is vastly reduced. This is because vigorous identity verification processes ensure that each customer is legitimate. This then significantly reduces fraudulent activity and improves market reputation.</p>



<h3 class="wp-block-heading">Reduced legal risks</h3>



<p>Legal obligations in the crypto space are continually changing and evolving. Now, crypto businesses face greater regulatory challenges than ever before.</p>



<p>But, by implementing robust crypto KYC processes now, businesses can stay ahead of the curve. Instead of chasing after new regulations, they can focus on increasing conversion rates, streamlining transactions, and ensuring compliance as international guidelines evolve.</p>



<p>On top of this, by continually staying on top of regulatory changes, businesses can ensure they’re always compliant. In doing so, they can avoid the strict penalties that can be handed down by regulators.</p>



<h3 class="wp-block-heading">Improved crypto market stability</h3>



<p>The cryptocurrency market is notoriously volatile. However, much of this volatility is driven by instability and the suspicious nature of some anonymous transactions. By removing anonymity from the process, crypto KYC can bring stability to the market.</p>



<h2 class="wp-block-heading">How Veriff solves KYC for crypto</h2>



<p>Here at&nbsp;<a href="https://www.veriff.com/">Veriff</a>, we make investing in crypto safe and easy. This is because our selfie-based&nbsp;<a target="_blank" href="https://www.veriff.com/crypto-identity-verification-veriff" rel="noreferrer noopener">crypto identity verification platform</a>&nbsp;provides industry-leading conversion rates and high levels of fraud prevention.</p>



<p>Our purpose-built solution provides global compliance. With our help, you can satisfy FINRA, SEC, and GDPR requirements, as well as enforce AMLD6 guidelines. Plus, you can verify your customers in as little as six seconds and verify 95% of your customers on the first try.</p>



<h2 class="wp-block-heading">Speak with the KYC compliance experts at Veriff</h2>



<p>Our crypto KYC compliance experts are available to help you. If you’d like to learn more about how our&nbsp;<a target="_blank" href="https://www.veriff.com/crypto-identity-verification-veriff" rel="noreferrer noopener">crypto identity verification solution</a>&nbsp;can help you meet your crypto KYC obligations,&nbsp;<a target="_blank" href="https://www.veriff.com/contact-sales" rel="noreferrer noopener">get in touch</a>&nbsp;with the team today. We’d love to provide you with a personalized demo that shows exactly how we can help you meet your goals.&nbsp;</p>
<p>The post <a rel="nofollow" href="https://www.veriff.com/kyc/learn/crypto-kyc-and-blockchain">Crypto KYC and blockchain</a> appeared first on <a rel="nofollow" href="https://www.veriff.com">Veriff</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Achieving KYC compliance: here’s why, and here’s how</title>
		<link>https://www.veriff.com/kyc/learn/achieving-kyc-compliance</link>
		
		<dc:creator><![CDATA[agustina.bustinduy@veriff.net]]></dc:creator>
		<pubDate>Thu, 24 Mar 2022 19:46:00 +0000</pubDate>
				<category><![CDATA[Education]]></category>
		<category><![CDATA[KYC]]></category>
		<guid isPermaLink="false">https://www.veriff.com/?post_type=kyc-article&#038;p=3478</guid>

					<description><![CDATA[<p>So, how do you become KYC compliant, and why would you need to be? Let us tell you all about it. In this article, we’ll cover the ins-and-outs of Know Your Customer (KYC) compliance and how to comply with KYC requirements in your organization. As a bonus, you’ll become an expert at identifying some of</p>
<p>The post <a rel="nofollow" href="https://www.veriff.com/kyc/learn/achieving-kyc-compliance">Achieving KYC compliance: here’s why, and here’s how</a> appeared first on <a rel="nofollow" href="https://www.veriff.com">Veriff</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>So, how do you become KYC compliant, and why would you need to be? Let us tell you all about it.</p>



<p>In this article, we’ll cover the ins-and-outs of Know Your Customer (KYC) compliance and how to comply with KYC requirements in your organization. As a bonus, you’ll become an expert at identifying some of the endless KYC-related acronyms, like CDD, CTF, CIP, PEP, and PII.</p>



<h2 class="wp-block-heading">What is KYC?</h2>



<p>KYC means conducting background checks on customers for pre-onboarding risk assessments. It is done by businesses to identify and verify the identities of clients to meet regulatory compliance. In other words, it ensures that you<a target="_blank" href="https://www.veriff.com/blog/do-you-know-your-customers" rel="noreferrer noopener">&nbsp;know your customers</a>. Meeting KYC or Customer Due Diligence (CDD) standards is a cornerstone of modern Anti-Money Laundering (AML) and Combating the Financing of Terrorism (CTF) policies.</p>



<p>Corporate KYC is an expansion of standard KYC regulations. Instead of focusing on verifying individuals, corporate KYC covers a set of procedures to verify businesses. It plays a crucial role in identifying fake companies and as such, corporate KYC regulations are a modern shield against worldwide money laundering. Corporate KYC plays a significant role in fulfilling KYC and AML compliance and it’s also often referred to as KYB (Know Your Business).</p>



<p>On Facebook, you see our “alternative” KYC definition from Veriff’s “identify verification industry glossary”:</p>



<h2 class="wp-block-heading">Who is impacted by KYC requirements?</h2>



<p>Initially, the regulations on KYC procedures only targeted financial institutions. Nowadays, however, KYC is considered a key obligatory procedure not only for financial but also for various non-financial institutions. The complete list of regulated entities that are impacted by KYC requirements varies from one country to another. Typically, the list of regulated entities includes:</p>



<ul class="wp-block-list">
<li>Financial institutions</li>



<li>Banks</li>



<li>Fintech companies</li>



<li>Credit unions</li>



<li>Gambling entities and casinos</li>



<li>Wallet providers and cryptocurrency exchanges</li>
</ul>



<p>Well-structured KYC processes greatly reduce the risk of fraud. Proper knowledge of KYC requirements and the associated procedures are becoming an increasingly important tool of survival in the complex world of anti-money laundering. But what exactly is the role of KYC in anti-money laundering? Let’s find out.</p>



<h2 class="wp-block-heading">The role of KYC in AML</h2>



<p><a target="_blank" href="https://www.veriff.com/blog/aml-compliance-amld5" rel="noreferrer noopener">The term AML</a>&nbsp;refers to different regulations from governments and international organizations. The main purpose of the existing AML regulations, such as the latest<a target="_blank" href="https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=uriserv:OJ.L_.2018.156.01.0043.01.ENG" rel="noreferrer noopener">&nbsp;Anti-Money Laundering Directive (AMLD5)</a>&nbsp;regulatory framework, is to address the following two types of crimes:</p>



<ul class="wp-block-list">
<li>Money laundering</li>



<li>Financing terrorism</li>
</ul>



<p>KYC is an essential component in the combating of these kinds of crimes, making KYC compliance an integral process for AML purposes. After all, organizations need to pay attention to who they onboard as a customer, and proper customer risk assessment through a well-functioning KYC process can filter out customers that are linked with money laundering or terrorism.</p>



<p>In short, KYC and AML are two very closely related sets of regulations. And, it’s nearly impossible to have one without the other. This means that if you want your organization to be fully compliant with either KYC or AML, you’ll inevitably have to learn the ins-and-outs of both of them.</p>



<p>The value of KYC was also highlighted during the COVID-19 pandemic. In a<a target="_blank" href="https://www.refinitiv.com/perspectives/financial-crime/aml-regulation-beyond-the-5th-amld/" rel="noreferrer noopener">&nbsp;survey from the Global Coalition to Fight Financial Crime</a>, 95.5% of respondents believed that due to the pandemic, financial crimes would increase. Any financial crime is closely tied together with AML, and KYC can play a significant role in the prevention of such crime by conducting precautionary measures. Considering all the worrying worldwide statistics of fraud, illicit activity, economic crimes, and money laundering, it’s no wonder why KYC regulations are becoming increasingly important.&nbsp;</p>



<p>So, what about the actual KYC process itself? What does it look like?</p>



<h2 class="wp-block-heading">The primary components of the KYC Process</h2>



<h3 class="wp-block-heading">1. Customer identification program (CIP)</h3>



<p>The KYC process includes obtaining and checking Personally Identifiable Information (PII). This phase is referred to as a Customer Identification Program (CIP). CIP is necessary to curb money laundering, counteract terrorist financing, and to combat various other criminal activities that could arise from improper identification of customers.</p>



<p>However, as is often the case with KYC regulations, there’s no one-size-fits-all type of solution to CIP. While CIP provides general instructions, it’s up to each company to decide which PII they choose to request according to their policy.</p>



<p>Some of the more commonly requested examples of PII include:</p>



<ul class="wp-block-list">
<li>Full name of the client</li>



<li>Date of birth of the client</li>



<li>Address of the client</li>
</ul>



<p>To verify PII, the clients might need to introduce official documents such as a passport, ID card, driver’s license, or residence permit. However, besides these three examples, various other types of PII can be requested from clients, and the PII verification processes should be adjusted accordingly.</p>



<p>For verification purposes, verifiers may also run<a target="_blank" href="https://help.veriff.me/en/articles/3250236-pep-and-sanctions-check" rel="noreferrer noopener">&nbsp;PEP (Politically Exposed Person) and Sanctions checks</a>&nbsp;against worldwide watch-lists.<a target="_blank" href="https://www.veriff.com/" rel="noreferrer noopener">&nbsp;Veriff</a>&nbsp;offers both PEP and Sanctions checks as one of its optional services.</p>



<h3 class="wp-block-heading">2. Customer due diligence (CDD)</h3>



<p>In the European Union, KYC process requirements are determined by the AMLD5 framework. According to the AMLD5, obligated entities must ensure that they know who their customers are. In legal policies, this process is referred to as “Customer Due Diligence (CDD)”, and it’s an integral part of financial institutions and other designated non-financial businesses and professions. Read more in our in-depth article on<a target="_blank" href="https://www.veriff.com/blog/aml-compliance-amld5" rel="noreferrer noopener">&nbsp;6 key AMLD5 guidelines</a>&nbsp;to examine the topic in-depth. And, here’s a<a target="_blank" href="https://ec.europa.eu/info/sites/info/files/diagram_aml_2018.07_ok.pdf" rel="noreferrer noopener">&nbsp;visual explanation of AML guidelines</a>&nbsp;from the European Commission.</p>



<p>In the United States, on the other hand, CDD requirements are enforced by the Financial Crimes Enforcement Network (FinCEN). FinCEN is authorized by the<a target="_blank" href="https://www.occ.treas.gov/topics/supervision-and-examination/bsa/index-bsa.html" rel="noreferrer noopener">&nbsp;Bank Secrecy Act (BSA)</a>&nbsp;to impose AML requirements on obligated legal entities and they require all obligated entities to be compliant with four main CDD rules. These rules bolster CDD requirements for financial institutions in the United States, and they apply to entities such as U.S. banks, mutual funds, securities brokers, and futures commission merchants, among others.</p>



<p>Examining both the<a target="_blank" href="https://www.govinfo.gov/content/pkg/FR-2016-05-11/pdf/2016-10567.pdf" rel="noreferrer noopener">&nbsp;four CDD rules</a>&nbsp;from the FinCEN and the<a target="_blank" href="https://www.cfatf-gafic.org/index.php/documents/fatf-40r/376-fatf-recommendation-10-customer-due-diligence" rel="noreferrer noopener">&nbsp;CDD recommendations</a>&nbsp;from the Financial Action Task Force (FATF) reveals that the two sets of rules are nearly identical. According to them, obligated entities must:</p>



<ol class="wp-block-list">
<li>Identify and verify customers</li>



<li>Identify and verify beneficial ownerships</li>



<li>Understand customer relationships and their risk profiles</li>



<li>Continue ongoing monitoring of customers and their transactions</li>
</ol>



<p>An organization that abides by these sets of rules and recommendations is one step closer to becoming KYC compliant. However, the process of performing CDD is a continuous one, and it varies case-by-case depending on the results of the initial customer risk assessment. That is why there are three different levels of CDD, each meant to be used for different clients depending on their risk levels.</p>



<p>These are the three primary types of CDD procedures</p>



<ul class="wp-block-list">
<li>Simplified Due Diligence (SDD) is used in cases where there is a low risk of money laundering or terrorism financing and a full CDD isn’t demanded.</li>



<li>Basic Customer Due Diligence (CDD) covers the basic information that is collected for customer identification and verification.</li>



<li>Enhanced Due Diligence (EDD) includes additional information that is obtained for higher-risk customers. This information is used to better understand customer activity and to mitigate any potential risks of criminal activities.</li>
</ul>



<h2 class="wp-block-heading">How much does KYC compliance cost to implement?</h2>



<p>According to recent findings, KYC processes cost the average bank $60 million annually. This is because each individual check costs between $10 and $100.&nbsp;</p>



<p>However, some companies can spend far more than this on KYC compliance. For example, in 2013 alone, JPMorgan added 5,000 employees to their compliance team and spent $1 billion on controls.</p>



<p>But, there’s no reason why KYC compliance needs to cost your business this much money. Here at Veriff, our starter plans cost as little as $1.49 per verification. Plus, you can enjoy a 30-day free trial.<a target="_blank" href="https://www.veriff.com/pricing#starter-plans" rel="noreferrer noopener">&nbsp;Book a consultation</a>&nbsp;today to see exactly how we can help you. Alternatively, start by learning more<a target="_blank" href="https://www.veriff.com/company" rel="noreferrer noopener">&nbsp;about us</a>.</p>



<h2 class="wp-block-heading">KYC risk profile?</h2>



<p>If you’re running a regulated entity, then it’s important that you know what a KYC risk profile (also known as a KYC risk scale) is.</p>



<p>Essentially, a KYC risk profile is a calculation of risk. The risk profile is created when a customer relationship is established. It is then used as a baseline for detecting suspicious activities.</p>



<p>Generally speaking, if a client’s risk level is high, they will be consistently and closely monitored. Crucially though, even if the risk rating of a client is low, they will still be monitored, just not as diligently.</p>



<p>Although a KYC risk profile is useful during onboarding, it can also be used to make a prediction of what a client’s risk should look like in the future. This is useful for determining whether something is unusual, out of place, or suspicious. For example, if a client’s transactions suddenly begin to diverge from your predictions, this may indicate suspicious behavior that needs to be investigated further.</p>



<h2 class="wp-block-heading">How Veriff can simplify the KYC process</h2>



<p>Now that you’ve had a chance to glimpse into the abbreviation-rich and oftentimes complicated world of KYC and AML, you might already be pulling your hair out from all these regulations and requirements. While it’s true that becoming legally compliant with all KYC and AML requirements is no easy task, it is a task that can be simplified through the use of online identification services.</p>



<p>In the 21st century, most regulators and organizations already acknowledge the reliability and ease of use of Electronic Know Your Customer (eKYC) and online identification services. This means that all the complicated and time-intensive processes involving personal data, customer identification, and verification can be reduced to a matter of minutes, if not seconds.</p>



<p>Through machine learning, artificial intelligence, and identity experts, Veriff provides organizations with the tools necessary to provide best-in-class online<a target="_blank" href="https://www.veriff.com/" rel="noreferrer noopener">&nbsp;identity verification in seconds</a>. Veriff collects more data points than any other identity verification provider. Many<a target="_blank" href="https://www.veriff.com/case-studies" rel="noreferrer noopener">&nbsp;large-scale companies</a>&nbsp;have chosen Veriff as their KYC and fraud prevention service provider. We hope you’ll also consider doing the same if you’re looking for someone reliable to help you achieve KYC compliance without losing your sanity in the process.</p>



<h3 class="wp-block-heading">Book a free consultation</h3>



<p>Interested in learning more about how our<a target="_blank" href="https://www.veriff.com/product/aml-screening" rel="noreferrer noopener">&nbsp;AML and KYC compliance solution</a>&nbsp;can help your business? Then<a target="_blank" href="https://www.veriff.com/contact-sales" rel="noreferrer noopener">&nbsp;book a free consultation</a>&nbsp;with us today.</p>



<p>Simply give us a few basic details about you and your company, and we’ll provide you with a personalized demo of what Veriff can do for you.</p>



<h2 class="wp-block-heading">Stay up to date on Veriff news, product updates, and more</h2>



<p>Veriff will only use the information you provide to share blog updates. You can unsubscribe any time. For more details, check out our&nbsp;<a target="_blank" href="https://www.veriff.com/privacy-notice" rel="noreferrer noopener">privacy_notice</a>.</p>
<p>The post <a rel="nofollow" href="https://www.veriff.com/kyc/learn/achieving-kyc-compliance">Achieving KYC compliance: here’s why, and here’s how</a> appeared first on <a rel="nofollow" href="https://www.veriff.com">Veriff</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>AML vs KYC &#8211; What’s the difference?</title>
		<link>https://www.veriff.com/kyc/learn/aml-vs-kyc</link>
		
		<dc:creator><![CDATA[agustina.bustinduy@veriff.net]]></dc:creator>
		<pubDate>Fri, 08 Oct 2021 19:49:00 +0000</pubDate>
				<category><![CDATA[Finserv]]></category>
		<category><![CDATA[KYC]]></category>
		<guid isPermaLink="false">https://www.veriff.com/?post_type=kyc-article&#038;p=3481</guid>

					<description><![CDATA[<p>An entity wanting to provide financial services, in addition to other regulatory requirements, needs to implement an AML and KYC program to protect itself against fraud and increase the level of security against funds being used for illicit activities. Of course, it is mandatory for financial service providers to comply with regulations, and they’re subjected</p>
<p>The post <a rel="nofollow" href="https://www.veriff.com/kyc/learn/aml-vs-kyc">AML vs KYC &#8211; What’s the difference?</a> appeared first on <a rel="nofollow" href="https://www.veriff.com">Veriff</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>An entity wanting to provide financial services, in addition to other regulatory requirements, needs to implement an AML and KYC program to protect itself against fraud and increase the level of security against funds being used for illicit activities. Of course, it is mandatory for financial service providers to comply with regulations, and they’re subjected to a range of different regulatory penalties if they fail to do so. That’s why it is essential to have a clear understanding of what anti-money laundering (AML) and know your customer (KYC) mean in real terms, and learn about the key differences between the two.</p>



<p>These terms are commonly used in the same context, but they mean different things. The significant difference between these two terms is that KYC is a specific process which takes place, upon fulfilling certain conditions (e.g. establishing business relationships, conducting an occasional transaction that exceeds certain amount, etc.), whereas AML is a entire set of procedures and processes aimed to combat money laundering and financing of terrorism, which can include KYC. This is the process of obtaining the information about the customer from a reliable and independent source, verifying it, and determining the risks from the establishment of a business relationship with said customer. The KYC process is used to ensure that entities obligated under the AML framework have sufficient knowledge about their customers and certainty about their identity. AML, on the contrary, can be described as an umbrella term for the entire set of regulated mechanisms and procedures that has to be implemented by a variety of financial actors to combat money laundering and financing of terrorism</p>



<p>In this article, we’ll tell you more about both AML and KYC programs, talk in-depth about the key differences, and explain the relevant processes, requirements, guidelines, and tools.&nbsp;</p>



<h2 class="wp-block-heading">What is AML &amp; what does it do?</h2>



<p>AML refers to the activities that financial and credit institutions, and companies in other fields, such as gambling providers or lawyers providing specific services, perform to actively monitor clients and prevent financial crimes. The anti-money laundering process helps prevent a wide range of illicit activities such as money laundering or financing of terrorism. Companies, in any case, need to take these measures in order to avoid the potential aftermath of regulatory action taken against them.</p>



<p>The goal is to implement specific regulatory provisions to prevent illicit financial activities by addressing the risk factors inherent to the service, product, or the customer of the company. The AML framework consists of numerous elements &#8211; among these are risk assessment of clients, risk management systems, KYC (or customer due diligence) programs, and relevant reporting obligations. It is particularly important for the companies exposed to higher risks of financial crimes to implement an effective anti-money laundering compliance program to avoid facilitating monetary crimes and ensure regulatory compliance. The system should be comprehensive, detailed, regulation-specific, and well-planned.&nbsp;</p>



<h2 class="wp-block-heading">What is KYC &amp; what does it do?</h2>



<p>We can define KYC as the process of obtaining and verifying a customer’s identity against independent and reliable sources to protect an entity against various risks of financial crime. One of the steps of this process requires potential customers to provide credentials, such as identity documents, to prove that they are who they claim to be. For example, financial institutions may require individuals to verify themselves before opening an account to ascertain their identity. This allows companies to make sure that their services are used only for lawful purposes and to be able to assist relevant authorities throughout an investigation when any issues occur.</p>



<p>Besides preventing crime, KYC processes help banks and other financial service providers understand their customers, improve services, and effectively manage risks. Hence, it is vital for financial institutions to correctly implement such procedures to minimize the chances of aiding any unlawful financial activities. The financial institutions are encouraged to consult different stakeholders, both internal and external, to understand their specific regulatory obligations with regards to the KYC procedures.&nbsp;</p>



<h2 class="wp-block-heading">How does AML work vs KYC?</h2>



<p>The main objective of the AML framework is to prevent criminals from easily accessing financial systems with the intention of laundering funds or conducting other financial crimes. The overall process aims to implement specific regulatory provisions to prevent illegal activities, mostly related to the financial system, and to avoid the usage of such a system for laundering funds. KYC, on the other hand, is one of the core elements of an AML framework as explained earlier. By obtaining the information about the customer as well as verifying their identity, it aims to prevent criminals from using a specific financial service for their unlawful activities.&nbsp;</p>



<p>There are various components that help companies adjust their AML and KYC processes to suit their needs. An excessive library of regulations, opinions of supervisory authorities, and guidelines, have been issued by the financial supervisors to help companies to prevent financial crime. Let’s take a look at these components and talk about the major differences between AML and KYC systems in depth.&nbsp;</p>



<h3 class="wp-block-heading">AML &amp; KYC processes</h3>



<p>In order to understand these processes, it is important to know about the risks associated with&nbsp;<a target="_blank" href="https://www.veriff.com/blog/what-is-money-laundering" rel="noreferrer noopener">Money Laundering</a>. This criminal activity can produce a massive negative impact on society, companies, and individuals. That’s why businesses worldwide must strive for compliance with money laundering prevention practices.&nbsp;</p>



<p>AML practices put procedures and systems in place that prevent criminals from being able to easily access financial products and services. Upon correct implementation of such systems, it is almost impossible to hide the illicit origins of money within transactions. One of the most important components of the AML system is the KYC process. Companies are obligated to establish their customer’s identities and verify them before providing services or products.&nbsp;</p>



<h3 class="wp-block-heading">AML &amp; KYC requirements</h3>



<p>During client onboarding, AML-obligated companies need to identify and verify the information on their customers to complete the procedure. According to the regulations, companies must take extra steps when the relationship with a customer has numerous higher-risk factors, in order to prevent circumvention of money laundering systems. They should actively monitor their customers’ behaviour with regards to the usage of their services. However, in certain cases, publicly available information may also give grounds for suspicions, and institutions must report suspicious activities when they occur, in accordance with the relevant regulatory requirements.&nbsp;</p>



<p>The KYC procedure is a mandatory step during this operation. It is essential to identify a client and verify their identity when providing services to them. This obligation helps companies fight fraud and avoid penalties from regulators. Businesses must ensure that they have a proper identity verification system set up, capable of verifying individuals using their ID documents and maintaining a track of high-risk customers to take actions when the need arises.&nbsp;</p>



<h3 class="wp-block-heading">AML &amp; KYC regulations<strong>&nbsp;</strong></h3>



<p>Different countries have different AML and KYC regulations for banks, and other credit and financial institutions to be considered compliant. Generally though, these steps are quite similar to each other because they’re based on the same practices. Companies at risk of financial crime are required to implement an&nbsp;<a target="_blank" href="https://www.veriff.com/blog/aml-compliance-amld5" rel="noreferrer noopener">anti-money laundering program</a>&nbsp;in order to avoid facilitating monetary crime and ensure compliance with the relevant regulations. The primary goal of these regulations is to detect, and respond to, the risks of money laundering and terrorism financing, thus preventing both.</p>



<p>On the other hand, we can describe&nbsp;<a target="_blank" href="https://www.veriff.com/blog/how-to-achieve-kyc-compliance" rel="noreferrer noopener">KYC compliance</a>&nbsp;as a regulatory obligation to develop customer identification processes, verify the information obtained about the customers on the basis of trust-worthy sources, as well as identifying and addressing the risks related to a particular product and customer. Consistent and effective application of the KYC procedures forms an integral part of the compliance with AML regulations.</p>



<h3 class="wp-block-heading">AML &amp; KYC tools</h3>



<p>There are several tools that help companies be compliant with AML and KYC regulations worldwide. For example, here at Veriff, we offer&nbsp;<a target="_blank" href="https://www.veriff.com/product/aml-screening" rel="noreferrer noopener">a full-stack AML and KYC solution</a>. The core components are Identity Verification, checking PEP &amp; Sanctions databases, considering adverse information &amp; media, and ongoing monitoring.&nbsp;</p>



<p>Using these tools you can ensure that your customers are who they say they are, and fight identity fraud effectively. Our verification engine makes automated decisions in a matter of seconds, which can help companies run their operations smoothly. Veriff also allows developers to deploy the end-to-end compliance technology with a single integration.</p>



<h3 class="wp-block-heading">How AML vs KYC works in Crypto</h3>



<p>Cryptocurrency is a solution for many people worldwide to have cheaper and faster international transactions. Unfortunately, this is not the only reason why people are getting involved in the growing industry. The crypto sector has also enabled criminals to launder money and fund terrorists in an easier way by being a product that strongly favours anonymity.&nbsp;</p>



<p>Regulatory bodies have been on a quest to address money laundering issues in the crypto industry that would help combat it, while not limiting the digital nature of the service. Previously, only crypto asset exchanges and custodian wallet providers have been subject to relevant anti money laundering regulations, yet in anticipation of upcoming&nbsp;<a target="_blank" href="https://ec.europa.eu/info/publications/210720-anti-money-laundering-countering-financing-terrorism_en" rel="noreferrer noopener">EU-wide AML Regulations, more and more countries are subjecting all crypto-asset service providers to abide by&nbsp; AML provisions.</a></p>



<h2 class="wp-block-heading">Get help with AML &amp; KYC services</h2>



<p>Here at Veriff, we want to make it easy for companies to connect with honest people. Take a look at our&nbsp;<a target="_blank" href="https://www.veriff.com/product/aml-screening" rel="noreferrer noopener">full-stack AML &amp; KYC Compliance solution</a>&nbsp;that can help you fight financial crime effectively. It’s easy for developers to deploy Veriff’s end-to-end compliance technology with a single integration, backed by industry-leading support and account management.&nbsp;</p>
<p>The post <a rel="nofollow" href="https://www.veriff.com/kyc/learn/aml-vs-kyc">AML vs KYC &#8211; What’s the difference?</a> appeared first on <a rel="nofollow" href="https://www.veriff.com">Veriff</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
