SlideShare a Scribd company logo
Data Sheet
IRIS-KYC
An On-boarding and Client Interaction solution
Email: info@extended-content.com
Phone: +44 (0)1483 688030
40 Occam Road
Guildford
Surrey
GU2 7YG
Extended Content Solutions DATA SHEET
3
Solution Summary
Bringing new clients on-board faster generates revenue and profits sooner. A professional and efficient on-
boarding process also sets the tone of relationship with the client going forward.
Know Your Customer (KYC) is the due diligence regulation that financial institutions must follow to
identify customers and obtain relevant information to do financial business with them, as part of their
Anti Money Laundering (AML) strategy. The requirements include recording and retaining specific
documentation such as account applications, customer identification records, account operating
agreements and large transaction records.
In most financial services organisations the process of on-boarding a new client is often manual, paper
driven and involves inter-departmental activity. Extended Content Solutions (ECS) is familiar with these
challenges and has created IRIS-KYC solution to assist securities firms to reduce time to on-board a
client by up to 80%, eliminate paper and remove manual steps to improve the efficiency of staff leading
to an improved engagement experience for the client on its first interaction with the firm.
IRIS-KYC solution is designed with flexibility to meet an organisation’s business activities and integrate
with core banking systems whilst meeting stringent compliance regulations. IRIS-KYC can be integrated
into an organisation’s core systems or sit alongside existing financial applications for batch processing of
documents and data. The solution offers:
Mail Room management &•
correspondence tracking
Document Capture and processing•
(mandate/application forms etc.)
KYC & AML checks (Document•
verification, Politically Exposed
Persons checks etc.)
Workflow , Tasks, checklists,•
triggered alerts for compliance
checking
Signature checking•
Periodic client reviews•
Risk-based client profiling•
Dispatch of documents and forms•
Reports•
Fully transparent and auditable on-•
boarding and client interaction
processes
Integration with backend systems•
(CRM, Account opening etc.)
Secure web-based multi-office access•
IRIS-KYC is designed for:
On-boarding new clients•
Maintain on-going relationship•
Periodic reviewo
Application
Forms
CRM
AML/KYC Data
verification
system
Client profile
IRIS - KYC
Central
database
Risk
assessment
Reports
Client Services
Supporting
documentation
Scanning
Extended Content Solutions DATA SHEET
4
Event-driven review (significant change in business or behaviour)o
Backlog processing (one-off review of existing relations)•
Extended Content Solutions DATA SHEET
5
Solution Details
Documents
Many KYC solutions focus on the regulation checklists and individual identification side of compliance.
These solution offerings rarely offer management or control over the documents that KYC compliance
generates. IRIS-KYC aims to tackle the document and data management challenge together in one
solution. By handling the KYC tasks alongside the supporting documentation from clients, IRIS-KYC
provides a comprehensive solution for companies to de-risk their customer engagement and meet AML
regulations.
Figure 1 shows details of an organisation in IRIS-KYC. The organisation has cleared KYC checks and its
status is indicated by IRIS-KYC’s traffic light status method showing a green status at the top of the
screen. Details of the organisation checks can be viewed below with the supporting document outlined in
the blue box. The icon shows a document is linked to one of the required documents, “Letter of
Authenticity”. By clicking on the document icon, the scan appears in a new window, shown in Figure 2.
This enables fast and reliable proof for financial institutions to verify KYC checking. By providing an
electronic copy linked into the KYC system, the financial organisation can store and share this information
securely and instantly across multiple branches through a web-browser.
Figure 1 - Supporting document link
Figure 2 - Supporting document view
Extended Content Solutions DATA SHEET
6
Scanning
The scanning function streamlines data entry and forms processing. Recognition capabilities streamline
key-from-image process. Barcodes can be used and optical character recognition (OCR) to automatically
populate document data for indexing purposes. Scan all KYC documents and regulatory documentation
and store against the client. Scan in application forms, with automatic data recognition classifying
documents is simplified.
The related data is easily viewable to the side of the scanned document for any additional data entry or
cross checking.
Below the document IRIS-KYC provides a listing of recent activity and any associated notes.
Figure 3 – Scanned document view
Client Information
To record due diligence efforts against a customer, IRIS-KYC manages information at three levels:
individual, organisation and relations between individuals and organisations. A customer can have
unlimited associated beneficiaries; each organisation, individual and relation carries its own list of
documents, stored information and an easily identifiable traffic light status indicator is used on all three
levels to instantly show KYC position.
IRIS-KYC integrates with Customer Identification solutions to provide a seamless process for the client
take-on process. A form is provided to capture all information and then checks against a Customer
Identification system to ensure AML checks have been performed. In situations where a customer’s
identity is not required, management can override the checking process at any of the three levels if
required. On any of the client information screens there is an option to drill further down into details to
see the audit history, supporting documents or client information.
Extended Content Solutions DATA SHEET
7
Figure 4 – Failed individual check using integrated Customer Identification system
Figure 5 – Successful individual check using integrated Customer Identification system
Extended Content Solutions DATA SHEET
8
Figure 6 – Adding a new person
Figure 7 shows all three customer level statuses. The top green indicator shows the individual has
passed KYC checks. The bottom of the figure shows three of the organisations she has a relationship
with. Each organisation on the far right has its own KYC check status indicated using the traffic light
status method. Additionally, each role the individual has in respective organisation also carries a KYC
check with traffic light indicators shown on the ticks. In the example shown, Mrs Tara Marchant as an
individual passes KYC regulations as does the organisation, The Centre. But only one of her roles at The
Centre has been successfully verified. The green tick provides a link to the supporting verification
information, shown in Figure 8. The KYC history is detailed in the popup window.
Similarly, on the organisation details page in Figure 9, the associated individuals are listed along with
their roles and their KYC statuses. The recognised methods for proving a relationship’s authenticity are
listed. If the user edits the details, for example to verify a relation, the user’s details are recorded
against the action along with the date and time. This information is later used in reports and system
auditing for traceability.
Extended Content Solutions DATA SHEET
9
Figure 7 – Individual details
Figure 8 – Individual check with audit tracking
Figure 9 – Organisation details
Extended Content Solutions DATA SHEET
10
Figure 10 – Organisation details showing successful relationship
KYC Task Traceability
As shown in the figures above, IRIS-KYC provides easy-to-use checklists for KYC compliance checking.
The application offers flexibility in its configuration to allow financial institutes the ability to tailor the KYC
checks for their own use. The system logs each step and provides inclusive reports with activity history.
Signature tracking
Signature tracking for individuals is simplified with IRIS-KYC. Once a sample signature is obtained, use
the scanned document to outline the signature as shown in Figure 11. After outlining the signature there
is a simple option to Copy Image. Figure 12 shows the organisation details screen and lists the
individuals with signatures on file. When clicking on one of the signature files the individual details
screen appears with the stored signature, as shown in Figure 13.
Figure 11 – Copy signature from scan
Extended Content Solutions DATA SHEET
11
Figure 12 – Save signature on file
Figure 13 – Individual details shows authorised stored signature
Extended Content Solutions DATA SHEET
12
Periodic Reviews
A key element of KYC is to ensure the initial client information remains satisfactory for financial dealings
throughout its relationship with the financial institute. This requires periodic reviews after the initial
client on-boarding. IRIS-KYC provides alerts when a customer’s information needs revalidating and is
easily configurable to meet the financial institute’s review policy time period.
Suspicious Activity Reporting (SAR)
When a financial organisation carries out background KYC checks on a new customer, it must raise a
Suspicious Activity Report (SAR) if there are concerns about the new customer’s funds. The organisation
is required to report its suspicions to the UK Financial Intelligence Unit (UKFIU). IRIS-KYC allows flagging
of any suspicious behaviour for review internally. If the company decides to escalate the incident, the
application can produce a report with all relevant client information and copies of associated
documentation.
Reports
Various reports are available in IRIS-KYC. Standard reports include: missing documents, expired
documents, customer details, and periodic review reports. Shown in Figure 13, the reporting tool in IRIS-
KYC provides multiple filtering options and drill down features to provide extensive reporting capabilities.
Figure 13 – Reporting screen
Contact Us
In addition to the IRIS-KYC application, ECS can provide consultancy to help financial organisations
comply with regulations. Our skilled financial services consultants have industry experience with
governance, risk and compliance.
For more information about IRIS-KYC or our services, please contact us at info@extended-content.com.

More Related Content

What's hot

2018-11-15 IT Assessment
2018-11-15 IT Assessment2018-11-15 IT Assessment
2018-11-15 IT Assessment
Raffa Learning Community
 
General Data Protection Regulation & Customer IAM
General Data Protection Regulation & Customer IAMGeneral Data Protection Regulation & Customer IAM
General Data Protection Regulation & Customer IAM
Ubisecure
 
Storage space CRM & ERP System - KanhaSoft
Storage space CRM & ERP System - KanhaSoftStorage space CRM & ERP System - KanhaSoft
Storage space CRM & ERP System - KanhaSoft
Manoj Bhuva
 
Cognia PCI DSS compliance services
Cognia PCI DSS compliance servicesCognia PCI DSS compliance services
Cognia PCI DSS compliance services
Cognia
 
Streamlining Submission Intake in Commercial Underwriting for Middle Market S...
Streamlining Submission Intake in Commercial Underwriting for Middle Market S...Streamlining Submission Intake in Commercial Underwriting for Middle Market S...
Streamlining Submission Intake in Commercial Underwriting for Middle Market S...
Cognizant
 
When does a company need to be PCI compliant
When does a company need to be PCI compliantWhen does a company need to be PCI compliant
When does a company need to be PCI compliantDivya Kothari
 
PCI FAQs and Myths - BluePay
PCI FAQs and Myths - BluePayPCI FAQs and Myths - BluePay
PCI FAQs and Myths - BluePay
BluePayProcessing
 
ECMTA 2009 PCI Compliance and the Ecommerce Merchant
ECMTA 2009 PCI Compliance and the Ecommerce MerchantECMTA 2009 PCI Compliance and the Ecommerce Merchant
ECMTA 2009 PCI Compliance and the Ecommerce Merchant
Melanie Beam
 
BSL Fintech special - English/german
BSL Fintech special - English/germanBSL Fintech special - English/german
BSL Fintech special - English/german
Lucile Mathe
 
BSL Fintech special / english-french
BSL Fintech special / english-frenchBSL Fintech special / english-french
BSL Fintech special / english-french
Lucile Mathe
 
Hybrid workforce for Customer Service to transform the Customer Experience
Hybrid workforce for Customer Service to transform the Customer ExperienceHybrid workforce for Customer Service to transform the Customer Experience
Hybrid workforce for Customer Service to transform the Customer Experience
10xDS - Exponential Digital Solutions
 
CheckPlusCFO secure payment software from Printech Global
CheckPlusCFO secure payment software from Printech GlobalCheckPlusCFO secure payment software from Printech Global
CheckPlusCFO secure payment software from Printech Global
Printech Global Secure Payment Solutions LLC
 
Tapping Blockchain to Slash Costs, Enhance Trust and Speed B2B Transactions
Tapping Blockchain to Slash Costs, Enhance Trust and Speed B2B TransactionsTapping Blockchain to Slash Costs, Enhance Trust and Speed B2B Transactions
Tapping Blockchain to Slash Costs, Enhance Trust and Speed B2B Transactions
Cognizant
 
KYC Document Management System | Digismartek
KYC Document Management System | DigismartekKYC Document Management System | Digismartek
KYC Document Management System | Digismartek
Digismartek
 
Fintech - MSME lending score card template for flow based lending
Fintech - MSME lending score card template for flow based lendingFintech - MSME lending score card template for flow based lending
Fintech - MSME lending score card template for flow based lending
Freelancer -Fintech and Blockchain consultant
 
Achieve instant approval and issuance of credit cards using bizagi nividous
Achieve instant approval and issuance of credit cards using bizagi   nividousAchieve instant approval and issuance of credit cards using bizagi   nividous
Achieve instant approval and issuance of credit cards using bizagi nividous
Swapnil Kanage
 

What's hot (19)

2018-11-15 IT Assessment
2018-11-15 IT Assessment2018-11-15 IT Assessment
2018-11-15 IT Assessment
 
General Data Protection Regulation & Customer IAM
General Data Protection Regulation & Customer IAMGeneral Data Protection Regulation & Customer IAM
General Data Protection Regulation & Customer IAM
 
Choosing Right RA
Choosing Right RAChoosing Right RA
Choosing Right RA
 
Storage space CRM & ERP System - KanhaSoft
Storage space CRM & ERP System - KanhaSoftStorage space CRM & ERP System - KanhaSoft
Storage space CRM & ERP System - KanhaSoft
 
Cognia PCI DSS compliance services
Cognia PCI DSS compliance servicesCognia PCI DSS compliance services
Cognia PCI DSS compliance services
 
Streamlining Submission Intake in Commercial Underwriting for Middle Market S...
Streamlining Submission Intake in Commercial Underwriting for Middle Market S...Streamlining Submission Intake in Commercial Underwriting for Middle Market S...
Streamlining Submission Intake in Commercial Underwriting for Middle Market S...
 
When does a company need to be PCI compliant
When does a company need to be PCI compliantWhen does a company need to be PCI compliant
When does a company need to be PCI compliant
 
PCI FAQs and Myths - BluePay
PCI FAQs and Myths - BluePayPCI FAQs and Myths - BluePay
PCI FAQs and Myths - BluePay
 
ECMTA 2009 PCI Compliance and the Ecommerce Merchant
ECMTA 2009 PCI Compliance and the Ecommerce MerchantECMTA 2009 PCI Compliance and the Ecommerce Merchant
ECMTA 2009 PCI Compliance and the Ecommerce Merchant
 
BSL Fintech special - English/german
BSL Fintech special - English/germanBSL Fintech special - English/german
BSL Fintech special - English/german
 
09Feb2012ISOAgent[1]
09Feb2012ISOAgent[1]09Feb2012ISOAgent[1]
09Feb2012ISOAgent[1]
 
Unit 3a
Unit 3aUnit 3a
Unit 3a
 
BSL Fintech special / english-french
BSL Fintech special / english-frenchBSL Fintech special / english-french
BSL Fintech special / english-french
 
Hybrid workforce for Customer Service to transform the Customer Experience
Hybrid workforce for Customer Service to transform the Customer ExperienceHybrid workforce for Customer Service to transform the Customer Experience
Hybrid workforce for Customer Service to transform the Customer Experience
 
CheckPlusCFO secure payment software from Printech Global
CheckPlusCFO secure payment software from Printech GlobalCheckPlusCFO secure payment software from Printech Global
CheckPlusCFO secure payment software from Printech Global
 
Tapping Blockchain to Slash Costs, Enhance Trust and Speed B2B Transactions
Tapping Blockchain to Slash Costs, Enhance Trust and Speed B2B TransactionsTapping Blockchain to Slash Costs, Enhance Trust and Speed B2B Transactions
Tapping Blockchain to Slash Costs, Enhance Trust and Speed B2B Transactions
 
KYC Document Management System | Digismartek
KYC Document Management System | DigismartekKYC Document Management System | Digismartek
KYC Document Management System | Digismartek
 
Fintech - MSME lending score card template for flow based lending
Fintech - MSME lending score card template for flow based lendingFintech - MSME lending score card template for flow based lending
Fintech - MSME lending score card template for flow based lending
 
Achieve instant approval and issuance of credit cards using bizagi nividous
Achieve instant approval and issuance of credit cards using bizagi   nividousAchieve instant approval and issuance of credit cards using bizagi   nividous
Achieve instant approval and issuance of credit cards using bizagi nividous
 

Similar to ECS IRIS Know Your Client (KYC) Solution

Application on Know Your Customer Authentication
Application on Know Your Customer AuthenticationApplication on Know Your Customer Authentication
Application on Know Your Customer Authentication
IRJET Journal
 
Business Intelligence For Anti-Money Laundering
Business Intelligence For Anti-Money LaunderingBusiness Intelligence For Anti-Money Laundering
Business Intelligence For Anti-Money Laundering
Kartik Mehta
 
Business Intelligence For Aml
Business Intelligence For AmlBusiness Intelligence For Aml
Business Intelligence For AmlKartik Mehta
 
How an Identity Verification Platform Can Safeguard Your Business.pdf
How an Identity Verification Platform Can Safeguard Your Business.pdfHow an Identity Verification Platform Can Safeguard Your Business.pdf
How an Identity Verification Platform Can Safeguard Your Business.pdf
rpacpc
 
Sales Tax Exemption Certificates
Sales Tax Exemption CertificatesSales Tax Exemption Certificates
Sales Tax Exemption Certificates
Credit Management Association
 
Regulatory & Compliance Account Opening
Regulatory & Compliance Account OpeningRegulatory & Compliance Account Opening
Regulatory & Compliance Account OpeningAxis Technology, LLC
 
Accounting Information Systems(AIS)
Accounting Information Systems(AIS)Accounting Information Systems(AIS)
Accounting Information Systems(AIS)
Mohammedseid Ahmedin
 
IT Security and Risk Management - Visionet Systems
IT Security and Risk Management - Visionet SystemsIT Security and Risk Management - Visionet Systems
IT Security and Risk Management - Visionet Systems
Visionet Systems, Inc.
 
FDSeminar Reporting & controlling
FDSeminar Reporting & controllingFDSeminar Reporting & controlling
FDSeminar Reporting & controlling
FDMagazine
 
Deloitte B2B Payments 2015 Report
Deloitte B2B Payments 2015 ReportDeloitte B2B Payments 2015 Report
Deloitte B2B Payments 2015 ReportRichard Miller
 
422017 Copyright © 2017, Association of International Certif.docx
422017 Copyright © 2017, Association of International Certif.docx422017 Copyright © 2017, Association of International Certif.docx
422017 Copyright © 2017, Association of International Certif.docx
BHANU281672
 
422017 Copyright © 2017, Association of International Certif.docx
422017 Copyright © 2017, Association of International Certif.docx422017 Copyright © 2017, Association of International Certif.docx
422017 Copyright © 2017, Association of International Certif.docx
taishao1
 
Capgemini ses - security po v (gr)
Capgemini   ses - security po v (gr)Capgemini   ses - security po v (gr)
Capgemini ses - security po v (gr)
Gord Reynolds
 
Webinar: Trust Exchange for Lenders-PPP Loan Forgiveness Platform
Webinar:  Trust Exchange for Lenders-PPP Loan Forgiveness PlatformWebinar:  Trust Exchange for Lenders-PPP Loan Forgiveness Platform
Webinar: Trust Exchange for Lenders-PPP Loan Forgiveness Platform
Trust Exchange
 
A systematic approach to pci compliance using rsa archer
A systematic approach to pci compliance using rsa archerA systematic approach to pci compliance using rsa archer
A systematic approach to pci compliance using rsa archerSubhajit Bhuiya
 
Sample audit plan
Sample audit planSample audit plan
Sample audit plan
Maher Manan
 
Verified Stripe Account.pdf
Verified Stripe Account.pdfVerified Stripe Account.pdf
Verified Stripe Account.pdf
ussmmstore.com
 
Verified Stripe Account.pdf3333333333333
Verified Stripe Account.pdf3333333333333Verified Stripe Account.pdf3333333333333
Verified Stripe Account.pdf3333333333333
ussmmstore
 
Verified Stripe Account Buy Verified Stripe Account
Verified Stripe Account Buy Verified Stripe AccountVerified Stripe Account Buy Verified Stripe Account
Verified Stripe Account Buy Verified Stripe Account
cashapp
 

Similar to ECS IRIS Know Your Client (KYC) Solution (20)

Application on Know Your Customer Authentication
Application on Know Your Customer AuthenticationApplication on Know Your Customer Authentication
Application on Know Your Customer Authentication
 
Business Intelligence For Anti-Money Laundering
Business Intelligence For Anti-Money LaunderingBusiness Intelligence For Anti-Money Laundering
Business Intelligence For Anti-Money Laundering
 
Business Intelligence For Aml
Business Intelligence For AmlBusiness Intelligence For Aml
Business Intelligence For Aml
 
How an Identity Verification Platform Can Safeguard Your Business.pdf
How an Identity Verification Platform Can Safeguard Your Business.pdfHow an Identity Verification Platform Can Safeguard Your Business.pdf
How an Identity Verification Platform Can Safeguard Your Business.pdf
 
Sales Tax Exemption Certificates
Sales Tax Exemption CertificatesSales Tax Exemption Certificates
Sales Tax Exemption Certificates
 
Regulatory & Compliance Account Opening
Regulatory & Compliance Account OpeningRegulatory & Compliance Account Opening
Regulatory & Compliance Account Opening
 
Accounting Information Systems(AIS)
Accounting Information Systems(AIS)Accounting Information Systems(AIS)
Accounting Information Systems(AIS)
 
IT Security and Risk Management - Visionet Systems
IT Security and Risk Management - Visionet SystemsIT Security and Risk Management - Visionet Systems
IT Security and Risk Management - Visionet Systems
 
FDSeminar Reporting & controlling
FDSeminar Reporting & controllingFDSeminar Reporting & controlling
FDSeminar Reporting & controlling
 
Deloitte B2B Payments 2015 Report
Deloitte B2B Payments 2015 ReportDeloitte B2B Payments 2015 Report
Deloitte B2B Payments 2015 Report
 
422017 Copyright © 2017, Association of International Certif.docx
422017 Copyright © 2017, Association of International Certif.docx422017 Copyright © 2017, Association of International Certif.docx
422017 Copyright © 2017, Association of International Certif.docx
 
422017 Copyright © 2017, Association of International Certif.docx
422017 Copyright © 2017, Association of International Certif.docx422017 Copyright © 2017, Association of International Certif.docx
422017 Copyright © 2017, Association of International Certif.docx
 
Capgemini ses - security po v (gr)
Capgemini   ses - security po v (gr)Capgemini   ses - security po v (gr)
Capgemini ses - security po v (gr)
 
ENTITY EXCHANGE FOR SELL-SIDE FIRMS
ENTITY EXCHANGE FOR SELL-SIDE FIRMSENTITY EXCHANGE FOR SELL-SIDE FIRMS
ENTITY EXCHANGE FOR SELL-SIDE FIRMS
 
Webinar: Trust Exchange for Lenders-PPP Loan Forgiveness Platform
Webinar:  Trust Exchange for Lenders-PPP Loan Forgiveness PlatformWebinar:  Trust Exchange for Lenders-PPP Loan Forgiveness Platform
Webinar: Trust Exchange for Lenders-PPP Loan Forgiveness Platform
 
A systematic approach to pci compliance using rsa archer
A systematic approach to pci compliance using rsa archerA systematic approach to pci compliance using rsa archer
A systematic approach to pci compliance using rsa archer
 
Sample audit plan
Sample audit planSample audit plan
Sample audit plan
 
Verified Stripe Account.pdf
Verified Stripe Account.pdfVerified Stripe Account.pdf
Verified Stripe Account.pdf
 
Verified Stripe Account.pdf3333333333333
Verified Stripe Account.pdf3333333333333Verified Stripe Account.pdf3333333333333
Verified Stripe Account.pdf3333333333333
 
Verified Stripe Account Buy Verified Stripe Account
Verified Stripe Account Buy Verified Stripe AccountVerified Stripe Account Buy Verified Stripe Account
Verified Stripe Account Buy Verified Stripe Account
 

Recently uploaded

Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
ViralQR
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 

Recently uploaded (20)

Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 

ECS IRIS Know Your Client (KYC) Solution

  • 1. Data Sheet IRIS-KYC An On-boarding and Client Interaction solution Email: info@extended-content.com Phone: +44 (0)1483 688030 40 Occam Road Guildford Surrey GU2 7YG
  • 2.
  • 3. Extended Content Solutions DATA SHEET 3 Solution Summary Bringing new clients on-board faster generates revenue and profits sooner. A professional and efficient on- boarding process also sets the tone of relationship with the client going forward. Know Your Customer (KYC) is the due diligence regulation that financial institutions must follow to identify customers and obtain relevant information to do financial business with them, as part of their Anti Money Laundering (AML) strategy. The requirements include recording and retaining specific documentation such as account applications, customer identification records, account operating agreements and large transaction records. In most financial services organisations the process of on-boarding a new client is often manual, paper driven and involves inter-departmental activity. Extended Content Solutions (ECS) is familiar with these challenges and has created IRIS-KYC solution to assist securities firms to reduce time to on-board a client by up to 80%, eliminate paper and remove manual steps to improve the efficiency of staff leading to an improved engagement experience for the client on its first interaction with the firm. IRIS-KYC solution is designed with flexibility to meet an organisation’s business activities and integrate with core banking systems whilst meeting stringent compliance regulations. IRIS-KYC can be integrated into an organisation’s core systems or sit alongside existing financial applications for batch processing of documents and data. The solution offers: Mail Room management &• correspondence tracking Document Capture and processing• (mandate/application forms etc.) KYC & AML checks (Document• verification, Politically Exposed Persons checks etc.) Workflow , Tasks, checklists,• triggered alerts for compliance checking Signature checking• Periodic client reviews• Risk-based client profiling• Dispatch of documents and forms• Reports• Fully transparent and auditable on-• boarding and client interaction processes Integration with backend systems• (CRM, Account opening etc.) Secure web-based multi-office access• IRIS-KYC is designed for: On-boarding new clients• Maintain on-going relationship• Periodic reviewo Application Forms CRM AML/KYC Data verification system Client profile IRIS - KYC Central database Risk assessment Reports Client Services Supporting documentation Scanning
  • 4. Extended Content Solutions DATA SHEET 4 Event-driven review (significant change in business or behaviour)o Backlog processing (one-off review of existing relations)•
  • 5. Extended Content Solutions DATA SHEET 5 Solution Details Documents Many KYC solutions focus on the regulation checklists and individual identification side of compliance. These solution offerings rarely offer management or control over the documents that KYC compliance generates. IRIS-KYC aims to tackle the document and data management challenge together in one solution. By handling the KYC tasks alongside the supporting documentation from clients, IRIS-KYC provides a comprehensive solution for companies to de-risk their customer engagement and meet AML regulations. Figure 1 shows details of an organisation in IRIS-KYC. The organisation has cleared KYC checks and its status is indicated by IRIS-KYC’s traffic light status method showing a green status at the top of the screen. Details of the organisation checks can be viewed below with the supporting document outlined in the blue box. The icon shows a document is linked to one of the required documents, “Letter of Authenticity”. By clicking on the document icon, the scan appears in a new window, shown in Figure 2. This enables fast and reliable proof for financial institutions to verify KYC checking. By providing an electronic copy linked into the KYC system, the financial organisation can store and share this information securely and instantly across multiple branches through a web-browser. Figure 1 - Supporting document link Figure 2 - Supporting document view
  • 6. Extended Content Solutions DATA SHEET 6 Scanning The scanning function streamlines data entry and forms processing. Recognition capabilities streamline key-from-image process. Barcodes can be used and optical character recognition (OCR) to automatically populate document data for indexing purposes. Scan all KYC documents and regulatory documentation and store against the client. Scan in application forms, with automatic data recognition classifying documents is simplified. The related data is easily viewable to the side of the scanned document for any additional data entry or cross checking. Below the document IRIS-KYC provides a listing of recent activity and any associated notes. Figure 3 – Scanned document view Client Information To record due diligence efforts against a customer, IRIS-KYC manages information at three levels: individual, organisation and relations between individuals and organisations. A customer can have unlimited associated beneficiaries; each organisation, individual and relation carries its own list of documents, stored information and an easily identifiable traffic light status indicator is used on all three levels to instantly show KYC position. IRIS-KYC integrates with Customer Identification solutions to provide a seamless process for the client take-on process. A form is provided to capture all information and then checks against a Customer Identification system to ensure AML checks have been performed. In situations where a customer’s identity is not required, management can override the checking process at any of the three levels if required. On any of the client information screens there is an option to drill further down into details to see the audit history, supporting documents or client information.
  • 7. Extended Content Solutions DATA SHEET 7 Figure 4 – Failed individual check using integrated Customer Identification system Figure 5 – Successful individual check using integrated Customer Identification system
  • 8. Extended Content Solutions DATA SHEET 8 Figure 6 – Adding a new person Figure 7 shows all three customer level statuses. The top green indicator shows the individual has passed KYC checks. The bottom of the figure shows three of the organisations she has a relationship with. Each organisation on the far right has its own KYC check status indicated using the traffic light status method. Additionally, each role the individual has in respective organisation also carries a KYC check with traffic light indicators shown on the ticks. In the example shown, Mrs Tara Marchant as an individual passes KYC regulations as does the organisation, The Centre. But only one of her roles at The Centre has been successfully verified. The green tick provides a link to the supporting verification information, shown in Figure 8. The KYC history is detailed in the popup window. Similarly, on the organisation details page in Figure 9, the associated individuals are listed along with their roles and their KYC statuses. The recognised methods for proving a relationship’s authenticity are listed. If the user edits the details, for example to verify a relation, the user’s details are recorded against the action along with the date and time. This information is later used in reports and system auditing for traceability.
  • 9. Extended Content Solutions DATA SHEET 9 Figure 7 – Individual details Figure 8 – Individual check with audit tracking Figure 9 – Organisation details
  • 10. Extended Content Solutions DATA SHEET 10 Figure 10 – Organisation details showing successful relationship KYC Task Traceability As shown in the figures above, IRIS-KYC provides easy-to-use checklists for KYC compliance checking. The application offers flexibility in its configuration to allow financial institutes the ability to tailor the KYC checks for their own use. The system logs each step and provides inclusive reports with activity history. Signature tracking Signature tracking for individuals is simplified with IRIS-KYC. Once a sample signature is obtained, use the scanned document to outline the signature as shown in Figure 11. After outlining the signature there is a simple option to Copy Image. Figure 12 shows the organisation details screen and lists the individuals with signatures on file. When clicking on one of the signature files the individual details screen appears with the stored signature, as shown in Figure 13. Figure 11 – Copy signature from scan
  • 11. Extended Content Solutions DATA SHEET 11 Figure 12 – Save signature on file Figure 13 – Individual details shows authorised stored signature
  • 12. Extended Content Solutions DATA SHEET 12 Periodic Reviews A key element of KYC is to ensure the initial client information remains satisfactory for financial dealings throughout its relationship with the financial institute. This requires periodic reviews after the initial client on-boarding. IRIS-KYC provides alerts when a customer’s information needs revalidating and is easily configurable to meet the financial institute’s review policy time period. Suspicious Activity Reporting (SAR) When a financial organisation carries out background KYC checks on a new customer, it must raise a Suspicious Activity Report (SAR) if there are concerns about the new customer’s funds. The organisation is required to report its suspicions to the UK Financial Intelligence Unit (UKFIU). IRIS-KYC allows flagging of any suspicious behaviour for review internally. If the company decides to escalate the incident, the application can produce a report with all relevant client information and copies of associated documentation. Reports Various reports are available in IRIS-KYC. Standard reports include: missing documents, expired documents, customer details, and periodic review reports. Shown in Figure 13, the reporting tool in IRIS- KYC provides multiple filtering options and drill down features to provide extensive reporting capabilities. Figure 13 – Reporting screen Contact Us In addition to the IRIS-KYC application, ECS can provide consultancy to help financial organisations comply with regulations. Our skilled financial services consultants have industry experience with governance, risk and compliance. For more information about IRIS-KYC or our services, please contact us at info@extended-content.com.