IRIS-KYC solution assists securities firms to reduce time of client onboarding by up to 80%, eliminate paper and remove manual steps. Iris-KYC solution is designed with flexibility to meet an organisation’s business activities and integrate with core banking systems whilst meeting stringent compliance regulations. IRIS-KYC can be integrated into an organisation’s core systems or sit alongside existing financial applications for batch processing of documents and data.
An electronic payment, also known as an e-payment, is a payment made or accepted online. Buyers can make these electronic payments with credit cards, debit cards, electronic checks, and virtual cards.
For companies and suppliers, business-to-business (B2B) e-payments are beneficial in several ways. One of the benefits for a company that incorporates e-payments is lower transaction processing costs. Processing costs can be lowered by as much as 80 percent because companies do not have to use paper, postage, printing, and mailing services.
Another non-monetary impact of electronic payments is an improved relationship between a company and its suppliers. This is due to faster payments to suppliers, more secure payments, and ready data to help suppliers perform payment reconciliation.
This white paper examines the factors that have driven rapid adoption of tokenization among retailers and other merchants, and offers lessons from the PCI experience that can be applied to other industries and use cases.
An electronic payment, also known as an e-payment, is a payment made or accepted online. Buyers can make these electronic payments with credit cards, debit cards, electronic checks, and virtual cards.
For companies and suppliers, business-to-business (B2B) e-payments are beneficial in several ways. One of the benefits for a company that incorporates e-payments is lower transaction processing costs. Processing costs can be lowered by as much as 80 percent because companies do not have to use paper, postage, printing, and mailing services.
Another non-monetary impact of electronic payments is an improved relationship between a company and its suppliers. This is due to faster payments to suppliers, more secure payments, and ready data to help suppliers perform payment reconciliation.
This white paper examines the factors that have driven rapid adoption of tokenization among retailers and other merchants, and offers lessons from the PCI experience that can be applied to other industries and use cases.
General Data Protection Regulation & Customer IAMUbisecure
The “General Data Protection & Customer IAM” white paper outlines the legal premise of the GDPR, and then delves into the specific parts where Customer Identity and Access Management solutions can help your organisation.
Streamlining Submission Intake in Commercial Underwriting for Middle Market S...Cognizant
For many insurance carriers, data submission for intake is still a manual, time-consuming process that ultimately takes up valuable underwriter time better spent on risk selection and pricing. We offer a streamlined submission intake process for commercial insurance firms that integrate automated tools and manual prequalification to handle ACORD forms and other data formats.
ECMTA 2009 PCI Compliance and the Ecommerce MerchantMelanie Beam
Since the deadline for level 4 merchants to be in compliance is July 2010, I thought I\'d share this presentation I did in July of 2009 at the Ecommerce Summit.
CheckPlusCFO check printing software integrates with most ERP, accounting and insurance claims systems including SAP, JD Edwards, Great Plains, PeopleSoft, Oracle Financials, Netsuite and other.
Micr Check Printing Software CheckPlusCFO can process:
◾Accounts Payable
◾Payroll
◾Interest payments
◾Dividends
◾Pension payments
◾Claims from insurance companies
◾Certificates
◾Travel Expenses and more.
CheckPlusCFO check printing software and electronic payments system is a turn-key solution and includes secure payment processing software, secure MICR printers and MICR toners, blank check stock with security features, folder-sealers.
Check printing software can work on demand for laser check printing. It can also run automatically in the background. New payment files generated by company ERP or accounting system can be automatically picked up by check printing software and processed. The system can also be configured for MICR laser checks and disbursements through the ACH electronic payment system.
CheckPlusCFO ACH component can be used to issue ACH and EFT payment without the actual check. Payments are disbursed directly to the payee account with email remittance representing notification of payment.
Tapping Blockchain to Slash Costs, Enhance Trust and Speed B2B TransactionsCognizant
Nacha and Discover Financial Services are exploring how distributed ledger technology and smart contracts can make online purchasing safer, faster and less costly for business partners.
Score card template for MSME lending with objective to create automatic underwriting engine using flow based lending framework. Data points can e taken from various sources like GST portal, Account statement, UPI, India stack, Bharat bill payment, Digilocker to create robust underwriting engine.
General Data Protection Regulation & Customer IAMUbisecure
The “General Data Protection & Customer IAM” white paper outlines the legal premise of the GDPR, and then delves into the specific parts where Customer Identity and Access Management solutions can help your organisation.
Streamlining Submission Intake in Commercial Underwriting for Middle Market S...Cognizant
For many insurance carriers, data submission for intake is still a manual, time-consuming process that ultimately takes up valuable underwriter time better spent on risk selection and pricing. We offer a streamlined submission intake process for commercial insurance firms that integrate automated tools and manual prequalification to handle ACORD forms and other data formats.
ECMTA 2009 PCI Compliance and the Ecommerce MerchantMelanie Beam
Since the deadline for level 4 merchants to be in compliance is July 2010, I thought I\'d share this presentation I did in July of 2009 at the Ecommerce Summit.
CheckPlusCFO check printing software integrates with most ERP, accounting and insurance claims systems including SAP, JD Edwards, Great Plains, PeopleSoft, Oracle Financials, Netsuite and other.
Micr Check Printing Software CheckPlusCFO can process:
◾Accounts Payable
◾Payroll
◾Interest payments
◾Dividends
◾Pension payments
◾Claims from insurance companies
◾Certificates
◾Travel Expenses and more.
CheckPlusCFO check printing software and electronic payments system is a turn-key solution and includes secure payment processing software, secure MICR printers and MICR toners, blank check stock with security features, folder-sealers.
Check printing software can work on demand for laser check printing. It can also run automatically in the background. New payment files generated by company ERP or accounting system can be automatically picked up by check printing software and processed. The system can also be configured for MICR laser checks and disbursements through the ACH electronic payment system.
CheckPlusCFO ACH component can be used to issue ACH and EFT payment without the actual check. Payments are disbursed directly to the payee account with email remittance representing notification of payment.
Tapping Blockchain to Slash Costs, Enhance Trust and Speed B2B TransactionsCognizant
Nacha and Discover Financial Services are exploring how distributed ledger technology and smart contracts can make online purchasing safer, faster and less costly for business partners.
Score card template for MSME lending with objective to create automatic underwriting engine using flow based lending framework. Data points can e taken from various sources like GST portal, Account statement, UPI, India stack, Bharat bill payment, Digilocker to create robust underwriting engine.
How an Identity Verification Platform Can Safeguard Your Business.pdfrpacpc
RPACPC is a well-known identity verification platform that provides services in India. It offers various features and services that contribute to its reputation as a reliable identity verification solution.
AIS is a system that collects, records, stores, and processes financial data to produce report as an information for decision makers.
It can:
Use advanced technology (computer), or
Be a simple paper-and-pencil system; or
Be something in between.
Technology is simply a tool to create, maintain, or improve a system.
With the global financial crises finally settling, everyone – from government sectors, industries, consumers - has noticeably shifted their focus on how to prevent such a crisis from occurring again. As a result, a deluge of well-intentioned regulations that contribute to improving corporate transparency and risk management have been formulated. However, business needs to be reassessed in view of complexity, overlapping controls, and an increased level of scrutiny estimated to arise with this deluge of new regulations being implemented. Frameworks and methodologies for IT’s best practices that comprise of ISO 27001 and ISO 27002 offer a roadmap and strategy that organizations require, however, they need to be implemented and executed appropriately in accordance with the standard regulations.
Furthermore, an Information Risk Management methodology helps in prioritizing security investments. It concentrates on the critical information and key business advantages that highlight security investments based on the risk associated with data and other corresponding activities, in relation to the potential business reward, and also ensure repeatability. At this point, organizations often turn to frameworks like ISO 27002 and the PCI Data Security Standard.
Didier Delanoye en Jasper Kerremans lichten toe hoe de steeds sneller veranderende processen bij hun klanten de aanpak van financiële audits beïnvloeden.
Ze tonen hoe ze daarop antwoorden bieden via de de data-enabled audit methodologie en process mining technieken.
Vertrekkende van enorme volumes aan gegevens, biedt de data-enabled audit methodologie nieuwe inzichten en meer assurance via verbeterde risico-inschattingen, analyses en testing, bijvoorbeeld van journaalboekingen.
Process mining wordt enerzijds ingezet om het functioneren van key controls te bevestigen, en anderzijds om betere inzichten in bedrijfsprocessen te verwerven, bijvoorbeeld door middel van visualisaties en animaties die belangrijke afwijkingen van de verwachte processen blootleggen of efficiëntieverschillen tussen entiteiten tonen.
Webinar: Trust Exchange for Lenders-PPP Loan Forgiveness PlatformTrust Exchange
Trust Exchange is part of a new breed of software companies that are designed as platforms vs. applications. One of the most powerful advances over the past few years is the enablement of collaborations (think Uber, AirBnB, Waze) where they enable customers to more readily interact and purchase by harnessing the power of collaboration. Trust is doing this for businesses and here we are presenting a solution, built on our platform for lenders to manage the PPP Loan forgiveness process.
If you want to more details Please Contact
24/7 Customer support
Telegram: @USASMMSTORE
WhatsApp : +1 (913) 701-7893
Skype : live:.cid.32b76ba857700527
Email : ussmmstore@gmail com
If you want to more details Please Contact
24/7 Customer support
Telegram: @USASMMSTORE
WhatsApp : +1 (913) 701-7893
Skype : live:.cid.32b76ba857700527
Email : ussmmstore@gmail com
If you want to more details Please Contact
24/7 Customer support
Telegram: @USASMMSTOR
WhatsApp : +1 (913) 701-7893
Skype : live:.cid.32b76ba857700527
Email : ussmmstore@gmail.com
Similar to ECS IRIS Know Your Client (KYC) Solution (20)
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Welocme to ViralQR, your best QR code generator.ViralQR
Welcome to ViralQR, your best QR code generator available on the market!
At ViralQR, we design static and dynamic QR codes. Our mission is to make business operations easier and customer engagement more powerful through the use of QR technology. Be it a small-scale business or a huge enterprise, our easy-to-use platform provides multiple choices that can be tailored according to your company's branding and marketing strategies.
Our Vision
We are here to make the process of creating QR codes easy and smooth, thus enhancing customer interaction and making business more fluid. We very strongly believe in the ability of QR codes to change the world for businesses in their interaction with customers and are set on making that technology accessible and usable far and wide.
Our Achievements
Ever since its inception, we have successfully served many clients by offering QR codes in their marketing, service delivery, and collection of feedback across various industries. Our platform has been recognized for its ease of use and amazing features, which helped a business to make QR codes.
Our Services
At ViralQR, here is a comprehensive suite of services that caters to your very needs:
Static QR Codes: Create free static QR codes. These QR codes are able to store significant information such as URLs, vCards, plain text, emails and SMS, Wi-Fi credentials, and Bitcoin addresses.
Dynamic QR codes: These also have all the advanced features but are subscription-based. They can directly link to PDF files, images, micro-landing pages, social accounts, review forms, business pages, and applications. In addition, they can be branded with CTAs, frames, patterns, colors, and logos to enhance your branding.
Pricing and Packages
Additionally, there is a 14-day free offer to ViralQR, which is an exceptional opportunity for new users to take a feel of this platform. One can easily subscribe from there and experience the full dynamic of using QR codes. The subscription plans are not only meant for business; they are priced very flexibly so that literally every business could afford to benefit from our service.
Why choose us?
ViralQR will provide services for marketing, advertising, catering, retail, and the like. The QR codes can be posted on fliers, packaging, merchandise, and banners, as well as to substitute for cash and cards in a restaurant or coffee shop. With QR codes integrated into your business, improve customer engagement and streamline operations.
Comprehensive Analytics
Subscribers of ViralQR receive detailed analytics and tracking tools in light of having a view of the core values of QR code performance. Our analytics dashboard shows aggregate views and unique views, as well as detailed information about each impression, including time, device, browser, and estimated location by city and country.
So, thank you for choosing ViralQR; we have an offer of nothing but the best in terms of QR code services to meet business diversity!
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Key Trends Shaping the Future of Infrastructure.pdf
ECS IRIS Know Your Client (KYC) Solution
1. Data Sheet
IRIS-KYC
An On-boarding and Client Interaction solution
Email: info@extended-content.com
Phone: +44 (0)1483 688030
40 Occam Road
Guildford
Surrey
GU2 7YG
2.
3. Extended Content Solutions DATA SHEET
3
Solution Summary
Bringing new clients on-board faster generates revenue and profits sooner. A professional and efficient on-
boarding process also sets the tone of relationship with the client going forward.
Know Your Customer (KYC) is the due diligence regulation that financial institutions must follow to
identify customers and obtain relevant information to do financial business with them, as part of their
Anti Money Laundering (AML) strategy. The requirements include recording and retaining specific
documentation such as account applications, customer identification records, account operating
agreements and large transaction records.
In most financial services organisations the process of on-boarding a new client is often manual, paper
driven and involves inter-departmental activity. Extended Content Solutions (ECS) is familiar with these
challenges and has created IRIS-KYC solution to assist securities firms to reduce time to on-board a
client by up to 80%, eliminate paper and remove manual steps to improve the efficiency of staff leading
to an improved engagement experience for the client on its first interaction with the firm.
IRIS-KYC solution is designed with flexibility to meet an organisation’s business activities and integrate
with core banking systems whilst meeting stringent compliance regulations. IRIS-KYC can be integrated
into an organisation’s core systems or sit alongside existing financial applications for batch processing of
documents and data. The solution offers:
Mail Room management &•
correspondence tracking
Document Capture and processing•
(mandate/application forms etc.)
KYC & AML checks (Document•
verification, Politically Exposed
Persons checks etc.)
Workflow , Tasks, checklists,•
triggered alerts for compliance
checking
Signature checking•
Periodic client reviews•
Risk-based client profiling•
Dispatch of documents and forms•
Reports•
Fully transparent and auditable on-•
boarding and client interaction
processes
Integration with backend systems•
(CRM, Account opening etc.)
Secure web-based multi-office access•
IRIS-KYC is designed for:
On-boarding new clients•
Maintain on-going relationship•
Periodic reviewo
Application
Forms
CRM
AML/KYC Data
verification
system
Client profile
IRIS - KYC
Central
database
Risk
assessment
Reports
Client Services
Supporting
documentation
Scanning
4. Extended Content Solutions DATA SHEET
4
Event-driven review (significant change in business or behaviour)o
Backlog processing (one-off review of existing relations)•
5. Extended Content Solutions DATA SHEET
5
Solution Details
Documents
Many KYC solutions focus on the regulation checklists and individual identification side of compliance.
These solution offerings rarely offer management or control over the documents that KYC compliance
generates. IRIS-KYC aims to tackle the document and data management challenge together in one
solution. By handling the KYC tasks alongside the supporting documentation from clients, IRIS-KYC
provides a comprehensive solution for companies to de-risk their customer engagement and meet AML
regulations.
Figure 1 shows details of an organisation in IRIS-KYC. The organisation has cleared KYC checks and its
status is indicated by IRIS-KYC’s traffic light status method showing a green status at the top of the
screen. Details of the organisation checks can be viewed below with the supporting document outlined in
the blue box. The icon shows a document is linked to one of the required documents, “Letter of
Authenticity”. By clicking on the document icon, the scan appears in a new window, shown in Figure 2.
This enables fast and reliable proof for financial institutions to verify KYC checking. By providing an
electronic copy linked into the KYC system, the financial organisation can store and share this information
securely and instantly across multiple branches through a web-browser.
Figure 1 - Supporting document link
Figure 2 - Supporting document view
6. Extended Content Solutions DATA SHEET
6
Scanning
The scanning function streamlines data entry and forms processing. Recognition capabilities streamline
key-from-image process. Barcodes can be used and optical character recognition (OCR) to automatically
populate document data for indexing purposes. Scan all KYC documents and regulatory documentation
and store against the client. Scan in application forms, with automatic data recognition classifying
documents is simplified.
The related data is easily viewable to the side of the scanned document for any additional data entry or
cross checking.
Below the document IRIS-KYC provides a listing of recent activity and any associated notes.
Figure 3 – Scanned document view
Client Information
To record due diligence efforts against a customer, IRIS-KYC manages information at three levels:
individual, organisation and relations between individuals and organisations. A customer can have
unlimited associated beneficiaries; each organisation, individual and relation carries its own list of
documents, stored information and an easily identifiable traffic light status indicator is used on all three
levels to instantly show KYC position.
IRIS-KYC integrates with Customer Identification solutions to provide a seamless process for the client
take-on process. A form is provided to capture all information and then checks against a Customer
Identification system to ensure AML checks have been performed. In situations where a customer’s
identity is not required, management can override the checking process at any of the three levels if
required. On any of the client information screens there is an option to drill further down into details to
see the audit history, supporting documents or client information.
7. Extended Content Solutions DATA SHEET
7
Figure 4 – Failed individual check using integrated Customer Identification system
Figure 5 – Successful individual check using integrated Customer Identification system
8. Extended Content Solutions DATA SHEET
8
Figure 6 – Adding a new person
Figure 7 shows all three customer level statuses. The top green indicator shows the individual has
passed KYC checks. The bottom of the figure shows three of the organisations she has a relationship
with. Each organisation on the far right has its own KYC check status indicated using the traffic light
status method. Additionally, each role the individual has in respective organisation also carries a KYC
check with traffic light indicators shown on the ticks. In the example shown, Mrs Tara Marchant as an
individual passes KYC regulations as does the organisation, The Centre. But only one of her roles at The
Centre has been successfully verified. The green tick provides a link to the supporting verification
information, shown in Figure 8. The KYC history is detailed in the popup window.
Similarly, on the organisation details page in Figure 9, the associated individuals are listed along with
their roles and their KYC statuses. The recognised methods for proving a relationship’s authenticity are
listed. If the user edits the details, for example to verify a relation, the user’s details are recorded
against the action along with the date and time. This information is later used in reports and system
auditing for traceability.
10. Extended Content Solutions DATA SHEET
10
Figure 10 – Organisation details showing successful relationship
KYC Task Traceability
As shown in the figures above, IRIS-KYC provides easy-to-use checklists for KYC compliance checking.
The application offers flexibility in its configuration to allow financial institutes the ability to tailor the KYC
checks for their own use. The system logs each step and provides inclusive reports with activity history.
Signature tracking
Signature tracking for individuals is simplified with IRIS-KYC. Once a sample signature is obtained, use
the scanned document to outline the signature as shown in Figure 11. After outlining the signature there
is a simple option to Copy Image. Figure 12 shows the organisation details screen and lists the
individuals with signatures on file. When clicking on one of the signature files the individual details
screen appears with the stored signature, as shown in Figure 13.
Figure 11 – Copy signature from scan
11. Extended Content Solutions DATA SHEET
11
Figure 12 – Save signature on file
Figure 13 – Individual details shows authorised stored signature
12. Extended Content Solutions DATA SHEET
12
Periodic Reviews
A key element of KYC is to ensure the initial client information remains satisfactory for financial dealings
throughout its relationship with the financial institute. This requires periodic reviews after the initial
client on-boarding. IRIS-KYC provides alerts when a customer’s information needs revalidating and is
easily configurable to meet the financial institute’s review policy time period.
Suspicious Activity Reporting (SAR)
When a financial organisation carries out background KYC checks on a new customer, it must raise a
Suspicious Activity Report (SAR) if there are concerns about the new customer’s funds. The organisation
is required to report its suspicions to the UK Financial Intelligence Unit (UKFIU). IRIS-KYC allows flagging
of any suspicious behaviour for review internally. If the company decides to escalate the incident, the
application can produce a report with all relevant client information and copies of associated
documentation.
Reports
Various reports are available in IRIS-KYC. Standard reports include: missing documents, expired
documents, customer details, and periodic review reports. Shown in Figure 13, the reporting tool in IRIS-
KYC provides multiple filtering options and drill down features to provide extensive reporting capabilities.
Figure 13 – Reporting screen
Contact Us
In addition to the IRIS-KYC application, ECS can provide consultancy to help financial organisations
comply with regulations. Our skilled financial services consultants have industry experience with
governance, risk and compliance.
For more information about IRIS-KYC or our services, please contact us at info@extended-content.com.