What is Social KYC?
We generate large amounts of data about ourselves online every single day. All of this activity, when analysed as a whole, builds up a very deep and unique digital footprint — something that’s exceedingly difficult for someone to steal or fake convincingly.
Social KYC harnesses this data and uses it to establish a person’s identity — on a consent driven basis, of course. Using algorithms to analyse and corroborate various data attributes across multiple online accounts it is possible to quickly establish the likelihood of a person being:
- real
- who they claim to be (including various demographic data related thereto)
- a legitimate potential user (rather than a fraudster trying to access your platform with malicious intent)
We’re all used to Single Sign On – using an existing social media account to sign up to a new service — and Social KYC is an extension of this. As all you’re doing is asking a user to log in to a variety of their online accounts to prove who they are, it makes for a far more fluid sign up experience which in turn will encourage more users onto your platform.
This document provides an overview of virtual banking. It begins with a history of virtual banking, including the first virtual banks in the United States, United Kingdom, Asia, and Hong Kong. It then discusses contemporary virtual banking, including the next generation of virtual banks being approved in Hong Kong. The document also covers topics like cyber customer onboarding, money laundering, risk management and compliance, and the impacts of virtual banking on the banking industry.
1) Virtual banking services allow users to manage their finances through online and mobile banking platforms. These services offer automated bookkeeping, payment processing, and money management tools integrated into a simple interface.
2) New fintech companies are challenging traditional banks by offering more convenient digital banking experiences through mobile apps. These virtual banks have lower overhead costs compared to legacy banks.
3) Mobility innovation in banking includes more than just mobile apps - it involves services like voice biometrics, social tools for group money management, and real-time payments. However, many banks are still hesitant to fully invest in becoming innovation leaders in this space.
This document provides an overview of anti-money laundering technologies, including name matching, suspicious scenario detection, and automated machine learning. It discusses algorithms like Jaro-Winkler and Soundex used for name matching against sanctions lists. Suspicious indicators and scenarios involving cash transactions are presented. Cash flow modeling using distributions like lognormal and exponential is described. Finally, machine learning techniques for transaction monitoring are introduced, covering data preparation, model building, and the machine learning cycle.
Holvi, Seed, CivilisedBank, Tide, Qonto, Azlo, Penta, Arival bank
Neobanks or fintechs for retail clients, which have launched business accounts recently: TransferWise, Revolut, StarlingBank, N26
(c) Life.SREDA VC
Several US states are working to become the blockchain and cryptocurrency capital of the country by passing crypto-friendly legislation. Wyoming has passed several bills defining cryptocurrencies as assets and exempting certain tokens from securities laws. This is aimed at attracting blockchain companies to the state. Tennessee is also pursuing pro-crypto policies like legally recognizing cryptocurrency payments. Delaware was an early leader but its blockchain director recently stepped down, though the state still plans to advance its goals in this area.
Credito is a decentralized credit scoring and lending marketplace built on Ethereum blockchain and smart contracts. It aims to bring transparency and reliability to credit scoring and lending. Credito provides credit scores to "credit invisibles" who lack traditional credit histories, enabling more access to financial services. It also builds a global decision platform for financial institutions to identify fraudulent transactions in real-time. Further, Credito introduces a decentralized collateralized lending marketplace connecting lenders and borrowers globally through smart contracts to reduce costs and intermediaries. Credito uses a analytic engine utilizing machine learning to generate dynamic credit scores based on transaction histories stored securely on IPFS.
Data loss prevention (DLP) systems are used to detect and prevent confidential data from being leaked outside an organization. For banking and financial institutions, DLP is especially important to protect sensitive personal information of customers, such as social security numbers, account balances, and credit information. Key laws and standards that regulate how financial institutions must protect data include the Gramm-Leach-Bliley Act, Payment Card Industry Data Security Standard, and Health Insurance Portability and Accountability Act. DLP solutions work at the endpoint, network, and storage levels to monitor and block unauthorized transmission of sensitive data.
This document provides an overview of virtual banking. It begins with a history of virtual banking, including the first virtual banks in the United States, United Kingdom, Asia, and Hong Kong. It then discusses contemporary virtual banking, including the next generation of virtual banks being approved in Hong Kong. The document also covers topics like cyber customer onboarding, money laundering, risk management and compliance, and the impacts of virtual banking on the banking industry.
1) Virtual banking services allow users to manage their finances through online and mobile banking platforms. These services offer automated bookkeeping, payment processing, and money management tools integrated into a simple interface.
2) New fintech companies are challenging traditional banks by offering more convenient digital banking experiences through mobile apps. These virtual banks have lower overhead costs compared to legacy banks.
3) Mobility innovation in banking includes more than just mobile apps - it involves services like voice biometrics, social tools for group money management, and real-time payments. However, many banks are still hesitant to fully invest in becoming innovation leaders in this space.
This document provides an overview of anti-money laundering technologies, including name matching, suspicious scenario detection, and automated machine learning. It discusses algorithms like Jaro-Winkler and Soundex used for name matching against sanctions lists. Suspicious indicators and scenarios involving cash transactions are presented. Cash flow modeling using distributions like lognormal and exponential is described. Finally, machine learning techniques for transaction monitoring are introduced, covering data preparation, model building, and the machine learning cycle.
Holvi, Seed, CivilisedBank, Tide, Qonto, Azlo, Penta, Arival bank
Neobanks or fintechs for retail clients, which have launched business accounts recently: TransferWise, Revolut, StarlingBank, N26
(c) Life.SREDA VC
Several US states are working to become the blockchain and cryptocurrency capital of the country by passing crypto-friendly legislation. Wyoming has passed several bills defining cryptocurrencies as assets and exempting certain tokens from securities laws. This is aimed at attracting blockchain companies to the state. Tennessee is also pursuing pro-crypto policies like legally recognizing cryptocurrency payments. Delaware was an early leader but its blockchain director recently stepped down, though the state still plans to advance its goals in this area.
Credito is a decentralized credit scoring and lending marketplace built on Ethereum blockchain and smart contracts. It aims to bring transparency and reliability to credit scoring and lending. Credito provides credit scores to "credit invisibles" who lack traditional credit histories, enabling more access to financial services. It also builds a global decision platform for financial institutions to identify fraudulent transactions in real-time. Further, Credito introduces a decentralized collateralized lending marketplace connecting lenders and borrowers globally through smart contracts to reduce costs and intermediaries. Credito uses a analytic engine utilizing machine learning to generate dynamic credit scores based on transaction histories stored securely on IPFS.
Data loss prevention (DLP) systems are used to detect and prevent confidential data from being leaked outside an organization. For banking and financial institutions, DLP is especially important to protect sensitive personal information of customers, such as social security numbers, account balances, and credit information. Key laws and standards that regulate how financial institutions must protect data include the Gramm-Leach-Bliley Act, Payment Card Industry Data Security Standard, and Health Insurance Portability and Accountability Act. DLP solutions work at the endpoint, network, and storage levels to monitor and block unauthorized transmission of sensitive data.
Virtual currencies emerging regulatory, law enforcement, and consumer protect...Dmitry Tseitlin
This document summarizes a report by the Government Accountability Office (GAO) on the emerging challenges posed by virtual currencies to federal regulatory and law enforcement agencies. It finds that virtual currencies provide greater anonymity than traditional payment systems, complicating efforts to detect money laundering and other crimes. It also notes that many virtual currency systems operate globally, requiring international cooperation among differing legal regimes. Additionally, consumer protection issues have emerged from volatility in currency values and losses of funds at exchanges. Federal agencies have taken some regulatory and enforcement actions but interagency coordination has not focused on consumer risks. The GAO recommends that consumer protection agencies participate in interagency groups to help address these risks.
The document discusses the evolving landscape of card and identity fraud, noting that:
1) Today's fraud is more sophisticated, complex, and organized than historical fraud, with criminal groups acquiring large volumes of consumer data from multiple sources and using it for various fraud schemes.
2) A key development is the targeting of PIN data, allowing criminals to withdraw cash directly from ATMs or make PIN debit purchases.
3) "Phishing" scams, where consumers are tricked into providing sensitive details, have become a major data acquisition method for criminals. Financial institutions are the most common phishing targets.
Blockchain for Trade Finance: Payment Instrument Tokenization (Part 4)Cognizant
Digitizing payment instruments in post-shipment financing on blockchain prevents invoicing fraud, reduces business risk for financial institutions and lowers overhead when issuing and managing trade receivables.
Online Transaction Fraud Detection using Hidden Markov Model & Behavior AnalysisCSCJournals
Card payment are mostly preferred by many for transactions instead of cash. Due to its convenience, it is the most accepted payment method for offline as well as online purchases, irrespective of region or country the purchase is made. Currently, cards are used for everyday activities, such as online shopping, bill pays, subscriptions, etc. Consequently, there are more chances of fraudulent transactions. Online transactions are the prime target as it does not require real card, only card details are enough and can be stored digitally. The current system detects the fraud transaction after the transaction is completed. Proposed system in this paper, uses Hidden Markov Model (HMM), which is one of the statistical stochastic models used to model randomly changing systems. Using Hidden Markov Model, a fraud transaction can be detected during the time of transaction itself and after 3 attempts of verification card can blocked at the same time. Behavior Analysis (BA) helps to understand the spending habits of cardholder. Hidden Markov Model helps to acquire high-level fraud analysis with a low false alarm ratio.
Blockchain for Trade Finance: Trade Asset Tokenization (Part 3)Cognizant
By tokenizing the trade asset on blockchain and digitally managing trade documents, organizations can obtain delivery assurance, improve risk management for buyers and sellers, and prevent losses.
This document discusses the top threats to financial service providers from online banking in 2010. The five top threats are identified as phishing, password database theft, man-in-the-middle attacks, man-in-the-browser attacks, and identity theft. It provides examples of each threat and discusses how authentication methods and hardware tokens can provide stronger security against these threats compared to passwords alone. Multi-factor authentication using physical tokens combined with passwords is recommended as the most effective solution.
June 2017 - The Alternative Lending Reportclaytonroot
The CFPB has requested public comments on a proposal to collect additional data on small business lending as required by the Dodd-Frank Act. This would require lenders to collect demographic data such as gender and race during loan applications. Some trade associations are pushing for an extension on the comment period due to concerns about the operational challenges of collecting this data. Some small business lenders are also worried about the costs and regulatory burden of complying with these new data collection requirements. The CFPB's proposal aims to improve transparency around credit access for minority and women-owned small businesses.
Blockchain for Trade Finance: Payment Method Automation (Part 2)Cognizant
Blockchain technology can be used to automate letters of credit (LC) and other payment methods in international trade. By modeling the LC as a smart contract on a blockchain, all parties can view the terms and conditions and track progress. This reduces ambiguities, errors, and disputes that cause payment delays. Smart contracts specify conditions precisely to determine compliance and ensure faster payment. Early visibility into the process allows quicker resolution of any discrepancies before payment. Blockchain eliminates inefficiencies, reduces costs, and ensures assured and timely payment for suppliers.
The document discusses PCI compliance for businesses that accept credit card payments. It explains that all businesses that process credit/debit card transactions, regardless of size, are required to comply with PCI security standards. It addresses common myths about PCI compliance, clarifying that even small businesses and non-ecommerce companies must comply, and that outsourcing payment processing does not guarantee compliance. The document provides answers to frequently asked questions about PCI compliance levels, vulnerability scanning, and whether debit card transactions are in-scope.
The document discusses scenarios for improving online identity verification and authentication in Canada to enable more government services to move online. It proposes that governments issue "digital credentials" similar to how they currently issue identity documents. This could allow individuals to securely provide identity information and proof of authentication to access online government services. The document also suggests that the financial sector and government need to work together to update systems using new credential technologies in a way that improves privacy while enabling online self-service options for citizens.
Access to finance for the informal sectorM S Siddiqui
Bangladesh may formulate policies to use these sources to in credit reporting systems. There may be even legal framework like some other some economies to allow the sharing of information from non-traditional sources and authorised CRSPs to prepare CR for MSMEs.
The Drive to Electronic Remittance Exchange in Business-to Business Payment A...Nasreen Quibria
The document discusses the drive for electronic remittance exchange in business-to-business payments. It summarizes trends in key markets like the US, Germany, and Finland. In the US, adoption of electronic payments has been slow and remittance information is often exchanged manually. NACHA and the Federal Reserve have taken steps to standardize remittance data in ACH and wire payments. In Europe, standards like SEPA have increased electronic payments but remittance reconciliation remains a challenge without common formats. Countries like Finland and Sweden have more advanced electronic payment infrastructures.
Decentralized ledger technology applications have shown great promise in recent years for several areas, particularly financial services. Decentralized finance has been recognized as one of the most recent applications of blockchain technology in the field of finance. Financing Inclusion (DeFi) has fundamentally rewritten the rules for financial inclusion and paved the way for new financial service ecosystems. DeFi training is on the rise with many enrolling in DeFi certification courses to get started with.
The document discusses Ukraine's national strategy for electronic identification from 2015-2019. It aims to create infrastructure for citizens to access electronic trust services and information from various sources online with reduced risks. The strategy addresses issues like the lack of a single national ID mechanism and gaps in regulation. It proposes building a national eID infrastructure, increasing interoperability, and encouraging citizens to use electronic trust services. Key goals include increasing the population using eID for e-services to 65% and harmonizing 100% of eID standards. The strategy also discusses the architecture and governance of the envisioned eID system.
How Blockchain Can Revitalize Trade Finance (Part 1)Cognizant
As a new way to secure the transfer of value, blockchain technology promises to increase collaboration, automation and oversight in trade finance transactions.
The document discusses the Payment Card Industry Data Security Standard (PCI-DSS) requirements for organizations in India. It provides background on the increasing use of debit/credit cards and e-commerce transactions, and the need to protect cardholder data. It describes the intended audience of the PCI-DSS standard, provides details on compliance requirements, certification processes, and challenges organizations face adhering to PCI-DSS. It also discusses instances of credit card fraud in India and how adherence to PCI-DSS can help mitigate such risks.
A42 banks race to defend from further reputational damageFreddie McMahon
The next wave of billion dollar fines is underway
as authorities are coming to the banks, already
armed with evidence of KYC, AML and CFT
systemic failings due to the way international
money transfers flow through correspondent
banks. This growing evidence shows how
money launderers’ businesses are successfully
laundering over a trillion dollars a year by
circumventing the controls of banks across the
world.
The document discusses FinTech markets and laws in Thailand. It provides an overview of the FinTech landscape in Thailand, including developments in areas such as digital banking, lending, fundraising, investments, payments and remittance, capital markets, and blockchain initiatives. It then examines the regulatory framework for FinTech, including laws governing electronic transactions, digital development, cybersecurity, data protection, and specific financial laws. Finally, it discusses regulations for payment services, digital consumer finance, digital assets, and key legal issues such as customer onboarding, national digital ID, and electronic signatures.
Our Law Firm specializes in Offshore Asset Protection through the use of offshore corporation, offshore private banking, offshore foundation... We are providing offshore banking introduction services for more than 8 years. Our team consists of professionals with banking, accounting and legal.
Blockchain is making revolutionary changes in various industries including, the finance sector. Using blockchain in the finance sector, many companies are already utilizing the benefits of this technology. But why should we consider using blockchain specifically?
At present, the financial industry is plagued with a lot of issues such as increasing cyber-attacks, poor IT infrastructure, complicated regulations across territories, payment frauds and identity thefts, delayed cross-border transactions, and so on. However, the finance sector is failing to tackle these problems leading to low customer satisfaction. Here, using blockchain in banking these companies can finally get rid of all of these issues for good.
So, how is Blockchain used in finance? Typically, blockchain can offer a lot of benefits such as efficient cross-border transactions, enforcing smart contracts, the establishment of central bank digital currency, increased data security, and many more. All of these advantages of using blockchain in the finance function are helping many enterprise-grade companies like HSBC, MasterCard, ING, etc. to solve their technological lacking.
We at 101 Blockchains believe blockchain is a prominent solution to secure the future of finance. That’s why we are offering premium quality blockchain courses and certification to help you be educated on the subject matter. We offer a selection of masterclasses and courses specifically for blockchain in finance.
Blockchain in Finance masterclass will focus on the practical implementation of blockchain and help you understand the effect of blockchain in the finance sector.
Learn more about the course from here ->
https://academy.101blockchains.com/courses/blockchain-in-finance
Central Bank Digital Currency (CBDC) Masterclass will focus on asset tokenization schemes and highlight the scope of creating digital assets.
Learn more about the course from here ->
https://academy.101blockchains.com/courses/central-bank-digital-currency
Enterprise Blockchains and Trade Finance Course will focus on how blockchain can improve current trade finance processes.
Learn more about the course from here ->
https://academy.101blockchains.com/courses/enterprise-blockchains-and-trade-finance
We also offer lucrative certification courses for professionals who want to learn about blockchain in order to develop blockchain-based finance applications.
Learn more about these courses from here ->
Certified Enterprise Blockchain Professional (CEBP) course https://academy.101blockchains.com/courses/blockchain-expert-certification
Certified Enterprise Blockchain Architect (CEBA) course
https://academy.101blockchains.com/courses/certified-enterprise-blockchain-architect
Certified Blockchain Security Architect (CBSE) course
https://academy.101blockchains.com/courses/certified-blockchain-security-expert
Virtual currencies emerging regulatory, law enforcement, and consumer protect...Dmitry Tseitlin
This document summarizes a report by the Government Accountability Office (GAO) on the emerging challenges posed by virtual currencies to federal regulatory and law enforcement agencies. It finds that virtual currencies provide greater anonymity than traditional payment systems, complicating efforts to detect money laundering and other crimes. It also notes that many virtual currency systems operate globally, requiring international cooperation among differing legal regimes. Additionally, consumer protection issues have emerged from volatility in currency values and losses of funds at exchanges. Federal agencies have taken some regulatory and enforcement actions but interagency coordination has not focused on consumer risks. The GAO recommends that consumer protection agencies participate in interagency groups to help address these risks.
The document discusses the evolving landscape of card and identity fraud, noting that:
1) Today's fraud is more sophisticated, complex, and organized than historical fraud, with criminal groups acquiring large volumes of consumer data from multiple sources and using it for various fraud schemes.
2) A key development is the targeting of PIN data, allowing criminals to withdraw cash directly from ATMs or make PIN debit purchases.
3) "Phishing" scams, where consumers are tricked into providing sensitive details, have become a major data acquisition method for criminals. Financial institutions are the most common phishing targets.
Blockchain for Trade Finance: Payment Instrument Tokenization (Part 4)Cognizant
Digitizing payment instruments in post-shipment financing on blockchain prevents invoicing fraud, reduces business risk for financial institutions and lowers overhead when issuing and managing trade receivables.
Online Transaction Fraud Detection using Hidden Markov Model & Behavior AnalysisCSCJournals
Card payment are mostly preferred by many for transactions instead of cash. Due to its convenience, it is the most accepted payment method for offline as well as online purchases, irrespective of region or country the purchase is made. Currently, cards are used for everyday activities, such as online shopping, bill pays, subscriptions, etc. Consequently, there are more chances of fraudulent transactions. Online transactions are the prime target as it does not require real card, only card details are enough and can be stored digitally. The current system detects the fraud transaction after the transaction is completed. Proposed system in this paper, uses Hidden Markov Model (HMM), which is one of the statistical stochastic models used to model randomly changing systems. Using Hidden Markov Model, a fraud transaction can be detected during the time of transaction itself and after 3 attempts of verification card can blocked at the same time. Behavior Analysis (BA) helps to understand the spending habits of cardholder. Hidden Markov Model helps to acquire high-level fraud analysis with a low false alarm ratio.
Blockchain for Trade Finance: Trade Asset Tokenization (Part 3)Cognizant
By tokenizing the trade asset on blockchain and digitally managing trade documents, organizations can obtain delivery assurance, improve risk management for buyers and sellers, and prevent losses.
This document discusses the top threats to financial service providers from online banking in 2010. The five top threats are identified as phishing, password database theft, man-in-the-middle attacks, man-in-the-browser attacks, and identity theft. It provides examples of each threat and discusses how authentication methods and hardware tokens can provide stronger security against these threats compared to passwords alone. Multi-factor authentication using physical tokens combined with passwords is recommended as the most effective solution.
June 2017 - The Alternative Lending Reportclaytonroot
The CFPB has requested public comments on a proposal to collect additional data on small business lending as required by the Dodd-Frank Act. This would require lenders to collect demographic data such as gender and race during loan applications. Some trade associations are pushing for an extension on the comment period due to concerns about the operational challenges of collecting this data. Some small business lenders are also worried about the costs and regulatory burden of complying with these new data collection requirements. The CFPB's proposal aims to improve transparency around credit access for minority and women-owned small businesses.
Blockchain for Trade Finance: Payment Method Automation (Part 2)Cognizant
Blockchain technology can be used to automate letters of credit (LC) and other payment methods in international trade. By modeling the LC as a smart contract on a blockchain, all parties can view the terms and conditions and track progress. This reduces ambiguities, errors, and disputes that cause payment delays. Smart contracts specify conditions precisely to determine compliance and ensure faster payment. Early visibility into the process allows quicker resolution of any discrepancies before payment. Blockchain eliminates inefficiencies, reduces costs, and ensures assured and timely payment for suppliers.
The document discusses PCI compliance for businesses that accept credit card payments. It explains that all businesses that process credit/debit card transactions, regardless of size, are required to comply with PCI security standards. It addresses common myths about PCI compliance, clarifying that even small businesses and non-ecommerce companies must comply, and that outsourcing payment processing does not guarantee compliance. The document provides answers to frequently asked questions about PCI compliance levels, vulnerability scanning, and whether debit card transactions are in-scope.
The document discusses scenarios for improving online identity verification and authentication in Canada to enable more government services to move online. It proposes that governments issue "digital credentials" similar to how they currently issue identity documents. This could allow individuals to securely provide identity information and proof of authentication to access online government services. The document also suggests that the financial sector and government need to work together to update systems using new credential technologies in a way that improves privacy while enabling online self-service options for citizens.
Access to finance for the informal sectorM S Siddiqui
Bangladesh may formulate policies to use these sources to in credit reporting systems. There may be even legal framework like some other some economies to allow the sharing of information from non-traditional sources and authorised CRSPs to prepare CR for MSMEs.
The Drive to Electronic Remittance Exchange in Business-to Business Payment A...Nasreen Quibria
The document discusses the drive for electronic remittance exchange in business-to-business payments. It summarizes trends in key markets like the US, Germany, and Finland. In the US, adoption of electronic payments has been slow and remittance information is often exchanged manually. NACHA and the Federal Reserve have taken steps to standardize remittance data in ACH and wire payments. In Europe, standards like SEPA have increased electronic payments but remittance reconciliation remains a challenge without common formats. Countries like Finland and Sweden have more advanced electronic payment infrastructures.
Decentralized ledger technology applications have shown great promise in recent years for several areas, particularly financial services. Decentralized finance has been recognized as one of the most recent applications of blockchain technology in the field of finance. Financing Inclusion (DeFi) has fundamentally rewritten the rules for financial inclusion and paved the way for new financial service ecosystems. DeFi training is on the rise with many enrolling in DeFi certification courses to get started with.
The document discusses Ukraine's national strategy for electronic identification from 2015-2019. It aims to create infrastructure for citizens to access electronic trust services and information from various sources online with reduced risks. The strategy addresses issues like the lack of a single national ID mechanism and gaps in regulation. It proposes building a national eID infrastructure, increasing interoperability, and encouraging citizens to use electronic trust services. Key goals include increasing the population using eID for e-services to 65% and harmonizing 100% of eID standards. The strategy also discusses the architecture and governance of the envisioned eID system.
How Blockchain Can Revitalize Trade Finance (Part 1)Cognizant
As a new way to secure the transfer of value, blockchain technology promises to increase collaboration, automation and oversight in trade finance transactions.
The document discusses the Payment Card Industry Data Security Standard (PCI-DSS) requirements for organizations in India. It provides background on the increasing use of debit/credit cards and e-commerce transactions, and the need to protect cardholder data. It describes the intended audience of the PCI-DSS standard, provides details on compliance requirements, certification processes, and challenges organizations face adhering to PCI-DSS. It also discusses instances of credit card fraud in India and how adherence to PCI-DSS can help mitigate such risks.
A42 banks race to defend from further reputational damageFreddie McMahon
The next wave of billion dollar fines is underway
as authorities are coming to the banks, already
armed with evidence of KYC, AML and CFT
systemic failings due to the way international
money transfers flow through correspondent
banks. This growing evidence shows how
money launderers’ businesses are successfully
laundering over a trillion dollars a year by
circumventing the controls of banks across the
world.
The document discusses FinTech markets and laws in Thailand. It provides an overview of the FinTech landscape in Thailand, including developments in areas such as digital banking, lending, fundraising, investments, payments and remittance, capital markets, and blockchain initiatives. It then examines the regulatory framework for FinTech, including laws governing electronic transactions, digital development, cybersecurity, data protection, and specific financial laws. Finally, it discusses regulations for payment services, digital consumer finance, digital assets, and key legal issues such as customer onboarding, national digital ID, and electronic signatures.
Our Law Firm specializes in Offshore Asset Protection through the use of offshore corporation, offshore private banking, offshore foundation... We are providing offshore banking introduction services for more than 8 years. Our team consists of professionals with banking, accounting and legal.
Blockchain is making revolutionary changes in various industries including, the finance sector. Using blockchain in the finance sector, many companies are already utilizing the benefits of this technology. But why should we consider using blockchain specifically?
At present, the financial industry is plagued with a lot of issues such as increasing cyber-attacks, poor IT infrastructure, complicated regulations across territories, payment frauds and identity thefts, delayed cross-border transactions, and so on. However, the finance sector is failing to tackle these problems leading to low customer satisfaction. Here, using blockchain in banking these companies can finally get rid of all of these issues for good.
So, how is Blockchain used in finance? Typically, blockchain can offer a lot of benefits such as efficient cross-border transactions, enforcing smart contracts, the establishment of central bank digital currency, increased data security, and many more. All of these advantages of using blockchain in the finance function are helping many enterprise-grade companies like HSBC, MasterCard, ING, etc. to solve their technological lacking.
We at 101 Blockchains believe blockchain is a prominent solution to secure the future of finance. That’s why we are offering premium quality blockchain courses and certification to help you be educated on the subject matter. We offer a selection of masterclasses and courses specifically for blockchain in finance.
Blockchain in Finance masterclass will focus on the practical implementation of blockchain and help you understand the effect of blockchain in the finance sector.
Learn more about the course from here ->
https://academy.101blockchains.com/courses/blockchain-in-finance
Central Bank Digital Currency (CBDC) Masterclass will focus on asset tokenization schemes and highlight the scope of creating digital assets.
Learn more about the course from here ->
https://academy.101blockchains.com/courses/central-bank-digital-currency
Enterprise Blockchains and Trade Finance Course will focus on how blockchain can improve current trade finance processes.
Learn more about the course from here ->
https://academy.101blockchains.com/courses/enterprise-blockchains-and-trade-finance
We also offer lucrative certification courses for professionals who want to learn about blockchain in order to develop blockchain-based finance applications.
Learn more about these courses from here ->
Certified Enterprise Blockchain Professional (CEBP) course https://academy.101blockchains.com/courses/blockchain-expert-certification
Certified Enterprise Blockchain Architect (CEBA) course
https://academy.101blockchains.com/courses/certified-enterprise-blockchain-architect
Certified Blockchain Security Architect (CBSE) course
https://academy.101blockchains.com/courses/certified-blockchain-security-expert
Credit Card Fraud Detection System Using Machine Learning AlgorithmIRJET Journal
This document discusses using machine learning algorithms to detect credit card fraud. It begins with an abstract that introduces credit card fraud as an increasing problem and machine learning as a solution. The introduction provides more background on credit card fraud and detection methods. It then discusses several machine learning algorithms that can be used for credit card fraud detection, including logistic regression, decision trees, random forests, and XGBoost. It concludes that hybrid models combining individual algorithms performed best on a publicly available credit card dataset, with the highest Matthews correlation coefficient of 0.823. References are provided on related work in credit card fraud detection techniques.
Secure Payments: How Card Issuers and Merchants Can Stay Ahead of FraudstersCognizant
Our latest research reveals that merchants and card issuers should take a layered approach to mitigating risk, by working with consumers to improve fraud detection and prevention.
This document discusses emerging payment systems and how millennials are driving changes in banking. It outlines current payment trends like increased mobile banking and adoption of contactless payments. Emerging technologies are allowing for more do-it-yourself banking options. The document predicts that within 5-10 years, digital banking will be more widespread and branches will be redefined to focus on community. Millennials preferences for convenience and security are pushing financial institutions to innovate their payment systems.
The document discusses the future of payments in the 21st century and how new technologies and business models are disrupting traditional payment systems. It analyzes trends like real-time payments, use of unique identifiers like phone numbers and emails, push-based systems like PayPal versus pull-based card networks, improved security and fraud controls, lower processing costs, and the transition away from paper checks and plastic cards to digital and mobile-based payments. PayPal is highlighted as an example of a company leveraging these 21st century innovations to build a highly successful new payments platform.
This document discusses the changing payments landscape and the need for strong authentication as payment technology advances. It notes that consumers now demand new payment methods through mobile devices and apps, but this increased flexibility has also enabled new forms of payment fraud. Regulators are responding by implementing guidelines requiring two-factor authentication for payments. Phone number verification is presented as an effective method that provides security, privacy and a quality user experience for customers.
This document discusses Know Your Customer (KYC) procedures for mobile money providers. KYC involves collecting customer identity information and verifying it to help prevent money laundering. International standards set specific KYC obligations, but these can exclude many poor customers who lack documents like IDs. However, alternatives like transaction limits and account monitoring may allow for reduced KYC while still mitigating risks. The World Bank has found this approach works, and an interview with a mobile money provider in the Philippines provides a real-world example. Tools are available to help assess money laundering risks and determine appropriate KYC levels.
KYC or “Know Your Customer” procedures are used by banks and other financial institutions to obtain information about the identity and address of the customers.
Check out the full details
https://bit.ly/2S5JnGj
Payment card fraud costs billions each year and is becoming more sophisticated. An online carding course was designed to teach novice criminals carding techniques over 6 weeks with 20 lectures and instructors. The course cost nearly $1000 and taught students how to make thousands each month. It covered buying stolen credit card details from online shops, committing fraud, and cashing out illegally obtained goods. Understanding these courses helps defenders address the latest criminal methods.
A Comparative Study on Online Transaction Fraud Detection by using Machine Le...IRJET Journal
This document summarizes a study that used machine learning and Python to detect online transaction fraud. It describes how online transactions and fraud are increasing. The study used a real credit card dataset to train models like KNN, NB, and SVM to detect fraudulent transactions based on user behavior patterns and restrict fraudulent users after three failed attempts. The goal was to develop a system that can detect fraud in real-time and prevent losses for banks and credit card users.
This document discusses various uses of AI in banking, including:
1) Know Your Customer/Client (KYC) and fraud detection using machine learning to analyze transactions and communications.
2) Anomaly detection using time series analysis to flag suspicious transaction patterns in real-time.
3) Customer churn prediction analyzing complex customer behavior data to identify at-risk customers.
The document discusses various uses of AI in banking, including:
1) Know Your Customer/Client (KYC) and fraud detection using machine learning to analyze transactions and find anomalous patterns.
2) Anomaly detection using time series analysis to detect network issues.
3) Customer churn prediction and credit risk scoring using more complex AI models to analyze individual customer data.
4) Anti-money laundering applications that use time series modeling to detect suspicious transaction networks.
Faster payments feature for The Treasurer April/May 2018benpoolewriter
This document discusses the rise of domestic instant payment schemes worldwide in the past six months and whether faster payments present more challenges than benefits for corporates. It notes that Australia, Europe, and the US have recently launched real-time payment systems, while the UK system has been operating for 10 years. Lower transaction limits and individual bank limits can hinder the business case for corporates using faster payment schemes. The increased speed also requires enhanced fraud monitoring, cash flow visibility, and liquidity management capabilities to address challenges. Demand exists for cross-border real-time payment tracking and instant payments, but a unified global approach is lacking.
This presentation explores what future of commerce may look like given the current trends in mobile devices, digital payments, social commerce and security including tokenization and new forms of identity verification
Fast Fraud and Merchants: How to Stop Your Next Biggest Threat (White Paper)Vesta Corporation
What is fast fraud and why is your business at risk? Fast fraud occurs when criminals take advantage of weaknesses in online and mobile commerce fraud prevention systems.
Here’s why you need to read Vesta’s latest white paper today:
1) Fast fraud is retail’s next big threat. What does that mean to your business?
2) How fast fraud threatens you and your customers
Why traditional fraud solutions won’t work
3) Discover tips to help you get started on a fast fraud solution
Learn more at http://info.trustvesta.com/fastfraud
Payments innovation is Critical for Every Global EnterpriseXTRMAccount
As fintech software and service innovations continue to disrupt the Financial Services market, even non-financial firms need to think about how to take advantage of this trend to improve
their payments processes for the benefit of the company, their customers and their partners.
Review on Fraud Detection in Electronic Payment GatewayIRJET Journal
This document reviews fraud detection in electronic payment gateways. It begins with an abstract that discusses how credit card fraud has increased with the rise of electronic commerce and online payments. It then provides background on payment gateways and discusses common types of credit card fraud like stolen cards, phishing, and internal theft. The literature review covers previous research on using techniques like hidden Markov models, support vector machines, and fingerprint recognition for fraud detection. The proposed system would add an additional layer of security to online transactions by generating a secret code and one-time password for each transaction and only proceeding if the user provides the correct code and password. This is intended to help verify the authenticity of transactions and reduce fraudulent activity.
FraudDECK includes pre-packaged business workflows for transaction surveillance across ATM & POS channels. It can be extended to facilitate surveillance of fraudulent transactions on other channels like mobile banking or payment transactions like Wire fraud or AML. For more information please visit: http://www.esq.com/transaction-surveillance/
Consistent toolbox talks are critical for maintaining workplace safety, as they provide regular opportunities to address specific hazards and reinforce safe practices.
These brief, focused sessions ensure that safety is a continual conversation rather than a one-time event, which helps keep safety protocols fresh in employees' minds. Studies have shown that shorter, more frequent training sessions are more effective for retention and behavior change compared to longer, infrequent sessions.
Engaging workers regularly, toolbox talks promote a culture of safety, empower employees to voice concerns, and ultimately reduce the likelihood of accidents and injuries on site.
The traditional method of conducting safety talks with paper documents and lengthy meetings is not only time-consuming but also less effective. Manual tracking of attendance and compliance is prone to errors and inconsistencies, leading to gaps in safety communication and potential non-compliance with OSHA regulations. Switching to a digital solution like Safelyio offers significant advantages.
Safelyio automates the delivery and documentation of safety talks, ensuring consistency and accessibility. The microlearning approach breaks down complex safety protocols into manageable, bite-sized pieces, making it easier for employees to absorb and retain information.
This method minimizes disruptions to work schedules, eliminates the hassle of paperwork, and ensures that all safety communications are tracked and recorded accurately. Ultimately, using a digital platform like Safelyio enhances engagement, compliance, and overall safety performance on site. https://safelyio.com/
Malibou Pitch Deck For Its €3M Seed Roundsjcobrien
French start-up Malibou raised a €3 million Seed Round to develop its payroll and human resources
management platform for VSEs and SMEs. The financing round was led by investors Breega, Y Combinator, and FCVC.
Flutter is a popular open source, cross-platform framework developed by Google. In this webinar we'll explore Flutter and its architecture, delve into the Flutter Embedder and Flutter’s Dart language, discover how to leverage Flutter for embedded device development, learn about Automotive Grade Linux (AGL) and its consortium and understand the rationale behind AGL's choice of Flutter for next-gen IVI systems. Don’t miss this opportunity to discover whether Flutter is right for your project.
Mobile App Development Company In Noida | Drona InfotechDrona Infotech
Drona Infotech is a premier mobile app development company in Noida, providing cutting-edge solutions for businesses.
Visit Us For : https://www.dronainfotech.com/mobile-application-development/
UI5con 2024 - Keynote: Latest News about UI5 and it’s EcosystemPeter Muessig
Learn about the latest innovations in and around OpenUI5/SAPUI5: UI5 Tooling, UI5 linter, UI5 Web Components, Web Components Integration, UI5 2.x, UI5 GenAI.
Recording:
https://www.youtube.com/live/MSdGLG2zLy8?si=INxBHTqkwHhxV5Ta&t=0
Using Query Store in Azure PostgreSQL to Understand Query PerformanceGrant Fritchey
Microsoft has added an excellent new extension in PostgreSQL on their Azure Platform. This session, presented at Posette 2024, covers what Query Store is and the types of information you can get out of it.
Top Benefits of Using Salesforce Healthcare CRM for Patient Management.pdfVALiNTRY360
Salesforce Healthcare CRM, implemented by VALiNTRY360, revolutionizes patient management by enhancing patient engagement, streamlining administrative processes, and improving care coordination. Its advanced analytics, robust security, and seamless integration with telehealth services ensure that healthcare providers can deliver personalized, efficient, and secure patient care. By automating routine tasks and providing actionable insights, Salesforce Healthcare CRM enables healthcare providers to focus on delivering high-quality care, leading to better patient outcomes and higher satisfaction. VALiNTRY360's expertise ensures a tailored solution that meets the unique needs of any healthcare practice, from small clinics to large hospital systems.
For more info visit us https://valintry360.com/solutions/health-life-sciences
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian CompaniesQuickdice ERP
Explore the seamless transition to e-invoicing with this comprehensive guide tailored for Saudi Arabian businesses. Navigate the process effortlessly with step-by-step instructions designed to streamline implementation and enhance efficiency.
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...XfilesPro
Wondering how X-Sign gained popularity in a quick time span? This eSign functionality of XfilesPro DocuPrime has many advancements to offer for Salesforce users. Explore them now!
Microservice Teams - How the cloud changes the way we workSven Peters
A lot of technical challenges and complexity come with building a cloud-native and distributed architecture. The way we develop backend software has fundamentally changed in the last ten years. Managing a microservices architecture demands a lot of us to ensure observability and operational resiliency. But did you also change the way you run your development teams?
Sven will talk about Atlassian’s journey from a monolith to a multi-tenanted architecture and how it affected the way the engineering teams work. You will learn how we shifted to service ownership, moved to more autonomous teams (and its challenges), and established platform and enablement teams.
Preparing Non - Technical Founders for Engaging a Tech AgencyISH Technologies
Preparing non-technical founders before engaging a tech agency is crucial for the success of their projects. It starts with clearly defining their vision and goals, conducting thorough market research, and gaining a basic understanding of relevant technologies. Setting realistic expectations and preparing a detailed project brief are essential steps. Founders should select a tech agency with a proven track record and establish clear communication channels. Additionally, addressing legal and contractual considerations and planning for post-launch support are vital to ensure a smooth and successful collaboration. This preparation empowers non-technical founders to effectively communicate their needs and work seamlessly with their chosen tech agency.Visit our site to get more details about this. Contact us today www.ishtechnologies.com.au
Preparing Non - Technical Founders for Engaging a Tech Agency
What is Social KYC?
1. 1
Background
The current form of Know Your Customer (KYC) regulation, introduced over a decade
ago, was initially focused on banks, and as a result can feel like a hindrance to
smaller and more nimble businesses, like cryptocurrency wallets and cross-border
e-commerce companies.
Identity verification (IDV) is a particularly challenging aspect of the KYC process, and
the traditional way of verifying identities using passports, driving licences and other
documentary forms of identification is becoming a barrier. A barrier to trade, but
judging by the increase in cases of identity theft (31% increase in the number of
victims of identity theft in the UK alone1
), not a barrier to criminals.
As if this wasn’t enough, traditional identity verification mechanisms also have an
unintended negative impact on financial inclusion. Users in developing countries
and those under the age of 24 are often seeing themselves declined through no
fault of their own simply because they don’t have official identity documents or a
comprehensive credit history.
This paper offers some ideas about identity verification in an online world. It explores
some common challenges when using traditional methods, and will introduce a new
approach — social KYC, using a person’s digital footprint and online social identities to
instantly verify and authenticate their identity with a high degree of confidence. This
approach can also be used to reduce fraud and to manage compliance requirements
as a complementary approach with other forms of KYC and IDV as required.
Social KYC can help you reach
more new users safely and
cost-effectively.
Whether you’re regulated or not, it makes good business sense to know your
customer, but there’s a fine line between getting the information you need to do
this and losing a potential user who feels your sign up process is unnecessarily
difficult or infringes on their privacy. With billions of people all over the world
using social media there are many good reasons to implement Social KYC as an
alternative, or as a complement, to traditional methods of identifying users.
1
Source: https://www.cifas.org.uk/id_fraud_first_quarter
A white paper from
Stop losing customers to
outdated KYC processes
2. 2
A brief history
The current form of Know Your Customer (KYC) regulation, introduced swiftly after
the 9/11 attacks in the United States, exists to prevent identity theft, financial fraud,
money laundering, terrorist financing and other financial crimes. When the current
regulations first came into force they were aimed predominantly at banks, but have
now been extended to cover more sectors, including providers of cryptocurrency
wallets in certain jurisdictions (recently the European Commission advised that all
European cryptocurrency exchanges will become obliged entities under the 4th Anti-
Money Laundering Directive2
).
Regulation has also become more stringent but less prescriptive — less about ticking
boxes and more about focusing your finite resources on the actual risks you face
using a risk-based evidentiary approach. This push for firms to take a risk-based
approach is a good thing — it gives you leeway to tailor your processes to meet the
needs of your business whilst combating money laundering and terrorist financing.
Verifying the identity of a new customer is one step in the KYC process, and has
traditionally been accomplished by checking a person’s official identity documents.
All well and good a decade ago when opening a bank account involved turning up at
your local branch, completing paper forms and waiting patiently while all the relevant
checks were carried out.
However, the environment companies operate in today is changing rapidly. We expect
to be able to sign up to new services online, and often on the go, and we expect
instant access. If we don’t get it we’ll go somewhere else, it’s that simple.
This is where the risk-based approach, and the use of Social KYC comes in.
Stop losing customers to outdated KYC Processes
North
America
68,6%
Latin
America
80,4%
Central
& Eastern
Europe
77,3%
Western
Europe
77,3%
Middle
East &
Africa
90,3%
Global Average
76,6%
Social network user penetration worldwide
— Projection for 2016 (eMarketer April 2013)
2
See EC Action Plan, 02 Feb 2016: http://europa.eu/rapid/press-release_MEMO-16-209_en.htm
3. 3
What is Social KYC?
We generate large amounts of data about ourselves online every single day. We buy
online, keep in touch with friends and family online, share photos, stream music and
films, it goes on. All of this activity, when analysed as a whole, builds up a very deep
and unique digital footprint — something that’s exceedingly difficult for someone to
steal or fake convincingly.
Social KYC harnesses this data and uses it to establish a person’s identity — on a
consent driven basis, of course. Using algorithms to analyse and corroborate various
data attributes across multiple online accounts it is possible to quickly establish the
likelihood of a person being:
• real
• who they claim to be (including various demographic data related thereto)
• a legitimate potential user (rather than a fraudster trying to access your platform
with malicious intent)
We’re all used to Single Sign On - using an existing social media account to sign up to
a new service — and Social KYC is an extension of this. As all you’re doing is asking a
user to log in to a variety of their online accounts to prove who they are, it makes for
a far more fluid sign up experience which in turn will encourage more users onto your
platform.
Stop losing customers to outdated KYC Processes
4. 4
KYC challenges
Today’s KYC regulation was not developed with an electronic world in mind nor does
it fully take account of emerging technologies, like cryptocurrency. KYC requirements
can seem at odds with your needs when trying satisfy increasingly demanding
consumers with sub-second response times and instant, low-cost global transactions.
In addition, the latitude to rely on data instead of documents is currently enshrined
in European law but many banks and regulators still insist on replicating the paper
based IDV and KYC processes of the old world.
Three of the most common challenges facing the online industry are:
1. Sign-up friction
Long forms, credit reference checks, and sharing official identity documents — they
all take time and add friction to your sign up process, not to mention increasing your
overheads on each transaction.
If document collection and checks are part of your main onboarding process you
need to be asking yourself why. Adding a ‘physical’ step into an otherwise purely
online experience has a tremendously negative impact on user experience, an
unnecessary evil in a world where online data about individuals is abundant. However,
many may find it useful to request documents if primary checks have not provided
sufficient verification or if any high risk factors are present that suggest further checks
would be prudent, e.g. high risk of money laundering or a PEP (Politically Exposed
Person) or sanctions list match.
2. Lack of official documents
The rise of the new middle class in emerging markets is a huge opportunity for
cryptocurrency wallet providers. Many of these individuals are struggling to access
traditional financial services because they don’t have a credit history, official
identity documents (e.g. passport or driving licence), or live in countries without
government mandated identity cards or electronic identity programmes. This lack of
documentation also affects young people.
Stop losing customers to outdated KYC Processes
5. 5
If your KYC process relies only on document checks, what opportunities are you
leaving on the table?
Conversely, if you’ve made the decision not to do any KYC at all because of the
difficulty in verifying identity in the markets you operate in, what risks are you
exposing your business to?
3. Cost
Traditional forms of verifying identity can be expensive. It takes people to gather and
review physical documents, and credit reference agency checks aren’t cheap.
Harnessing online data, on a consent-driven basis, is a reliable, yet highly cost-
effective alternative to this challenge.
These challenges really only exist if you simply choose to follow the crowd when it
comes to developing your KYC processes. Why look to the big banks for inspiration?
They’ve had years to develop and refine processes that were built for a world that
has changed. Many have thrown substantial amounts of money and people at the
problem to compensate for outdated technology, and are still coming under fire from
regulators for not getting it right.
Emerging technology companies have the ability to start from scratch to build
processes that completely fit in with their business requirements and that put the
customers’ requirements of speed and ease first. Getting it right requires that you use
efficient and proportionate processes to risk management and that you are able to
explain those decisions and processes to your regulators and board.
Identity and how to prove it
So do you really need to see those documents?
The EU Anti-Money Laundering Directive (Directive) states that customer’s identity can
be verified using documents, data or information.
Customer due diligence measures shall comprise:
”identifying the customer and verifying the customer’s identity on the basis of
documents, data or information obtained from a reliable and independent
source”
(Article 13, 4th Anti-Money Laundering Directive)
The UK Joint Money Laundering Steering Group (JMLSG) guidance (UK Guidance)
offers cross-sector guidance and they emphasise your responsibility to make your
own judgements based on the information available and using a risk-based approach.
”Evidence of identity can take a number of forms. In respect of individuals,
much weight is placed on so-called ‘identity documents’, such as passports
and photocard driving licences, and these are often the easiest way of being
reasonably satisfied as to someone’s identity. It is, however, possible to be
reasonably satisfied as to a customer’s identity based on other forms of
confirmation…
… How much identity information or evidence to ask for, and what to verify, in
order to be reasonably satisfied as to a customer’s identity, are matters for the
judgement of the firm, which must be exercised on a risk-based approach...”
(JMLSG Guidance 5.3.28 and 5.3.29)
Stop losing customers to outdated KYC Processes
6. 6
The Directive also allows for firms to carry out simplified due diligence (SDD), as part
of a risk based approach, if certain conditions are met, e.g. depending on the person
concerned or the product involved. SDD means that firms do not have to carry
out full customer due diligence but it does not normally equate to fully anonymous
transactions either, operators should ensure they can explain and justify situations
where SDD is appropriate.
The UK Guidance states that identity would typically include full name, address
and date of birth. However, neither the Directive, nor the UK Money Laundering
Regulations (MLRs) defines exactly what identity is. It could be possible to adopt an
SDD strategy where, providing no other money laundering / terrorist financing risk
indicators are present, a non-traditional approach to identity checking is adopted.
Given the legislative permission to use a range of documents and data, and
considering the friction introduced into the on boarding process when a new user
is asked to share identity documents, firms can, and should, embrace a risk-based
approach and look beyond commonly accepted preconceptions about how to verify
identity.
Can my business use Social KYC?
The answer is yes, when using the risk-based approach that regulators expect to see.
It can be used on its own, in many cases, for a wide range of e-commerce operators
that are not currently obliged (regulated) entities under European AML law. For
example, some e-commerce operators are required to have confidence that their
services are not being offered to persons under 18. Social KYC can provide such
comfort.
For entities regulated under AML where stricter standards are mandated, social
KYC can be used as part of a wider compliance and risk strategy that increases the
amount of data and/or documents that you collect and verify commensurate with the
risks of money laundering and terrorist financing.
Stop losing customers to outdated KYC Processes
7. 7
Use case for Social KYC for Cryptocurrency
For the purposes of this paper we have constructed a basic hypothetical tiered
KYC & IDV construct for a cryptocurrency exchange that is based on the current
requirements for e-money and payment service companies - whilst cryptocurrency is
not yet fully in scope of European AML rules it is essential that operators in this sector
are not perceived to operate a lighter touch approach than regulated electronic
money issuers.
An example of a possible risk based and defensible use of Social KYC within the
cryptocurrency sector3:
Cryptocurrency Exchange ‘ABC’ wishes to enable easier on-boarding of its
lower value clients, especially from emerging markets, and so creates a tiered
KYC structure:
all customers names and addresses are collected and identity is verified
against social data4 in addition to conducting sanctions checking and
possibly adverse media checks (IDV & KYC Level 0)
customers that wish to transfer to or from their account or hold >
EUR1000 in the wallet (local currency equivalent) must also have their
addresses independently verified - can be via any platforms that also
permit DOB and address verification, such as available social platforms5,
Blockchain ID, payment service providers or third party data providers (IDV
and KYC Level 1)
customers from higher risk countries outside of the EEA and all other
customers are subject to enhanced due diligence requirements including
Politically Exposed Persons (PEP) checking (IDV and KYC Level 2)
any persons that are a match for PEP checking and any other customers
deemed to be higher risk are subject to a requirement to obtain
information or verification of source of wealth/funds (IDV and KYC Level 2)
Fintech firms should consider replacing costly identity verification at onboarding with
a social KYC approach that increases the data and/or documents requested and
verified based on a risk assessment of territories, products and customers. Users get
a more fluid sign-up experience and you get the information you need to adequately
identify them based on the perceived level of risk. As long as you have processes and
procedures that are justifiable, well documented and consistently applied, regulators
will look favourably at your approach. However, you should use this as an opportunity
to work with your regulator so that they can understand how new technologies can
be used to better manage AML risks.
Stop losing customers to outdated KYC Processes
3
Please note this is not a compliant AML compliance construct ‘per se’ because AML compliance
constructs require detailed consideration of inter alia: country (of establishment, customer and source of
funds), customer type and ongoing behaviour, product type, and any additional risk factors. However, we
offer it as an example of how you might start to construct a policy to meet KYC obligations relying on new
technologies and social data.
4
The degree of confidence required from the social data verification should also increase commensurate
with risk. This means that triangulation or deeper data from one source may be required as customers
move up through the risk tiers.
5
LinkedIn, Facebook, Google+, Amazon, PayPal
8. 8
Adopting Social KYC: Factors to consider
Social KYC can be an excellent tool for non-regulated entities that are not subject to
the requirements of the Directive or Money Laundering regulations (MLRs), but wish
to carry out some form of verification of their clients.
Regulated entities who are subject to the Directive and MLRs could also benefit from
using Social KYC as part of a risk based approach to their money laundering and
terrorist financing obligations under the Directive and MLRs.
A risk based approach
Anyone using Social KYC should ensure that it is appropriate for their business and
customers, and should implement it as part of a risk based approach to its KYC and
AML / Counter Terrorist Financing (CTF) strategy.
The Guidance, while technically not applicable to non-regulated firms, can be useful
in creating an appropriate KYC strategy and should also be considered by firms
working in areas that may, in the future, become subject to such regulation, e.g.
cryptocurrency firms.
JMLSG recognises that the electronic ‘footprint’ of individuals can provide useful
corroboration of a customer’s identity:
5.3.35 External electronic databases are accessible directly by firms, or through
independent third party organisations. The size of the electronic ‘footprint’ (see
paragraph 5.3.25) in relation to the depth, breadth and quality of data, and
the degree of corroboration of the data supplied by the customer, may provide
a useful basis for an assessment of the degree of confidence in their identity.
(JMLSG Guidance 5.3.35)
However, the Guidance also states:
“For an electronic check to provide satisfactory evidence of identity on its
own, it must use data from multiple sources, and across time, or incorporate
qualitative checks that assess the strength of the information supplied. An
electronic check that accesses data from a single source (e.g., a single check
against the Electoral Roll) is not normally enough on its own to verify identity.”
(JMLSG Guidance 5.3.39)
This confirms that the use of a single social source for IDV checking is not, on its
own, sufficient to verify identity for regulated entity purposes (though it may still be
acceptable at certain simplified due diligence levels for some products and in some
cases). However, for regulated entities, the use of social IDV from multiple sources in
order to gain greater confidence could meet this requirement at both standard and
enhanced levels of CDD depending on the data available and the circumstances - i.e.
Social KYC can meet the IDV requirements for regulated entities.
Social KYC has its place in a wider KYC strategy allowing firms to analyse multiple
sources (LinkedIn, Facebook, Twitter and many more), each of which can offer a deep
history that is exceedingly hard to fake convincingly. Each data point (name, location,
date of birth etc.) can be corroborated across the various sources in order to assess
the credibility of that data.
It is key to note that under the MLRs, an SDD approach is not acceptable in any cases
where money laundering or terrorist financing is suspected (or known). If a regulated
entity identifies such activity they must make a report to the relevant authority.
Stop losing customers to outdated KYC Processes
9. 9
Social KYC and the regulators
As more and more people use social media and create an increasingly broad and
deep electronic footprint this information will become increasingly valuable as a
source of identity and proof of life. As the use of Social KYC becomes more common,
strategies can be honed and improved and give users ever greater confidence in its
ability to effectively identify their customers. It is essential that operators work with
the relevant authorities to ensure they understand how Social KYC can be used to
enable financial inclusion, better customer experiences and better electronic data
on customers and transactions whilst also managing the serious risk of money
laundering and terrorist financing.
We’ve always insisted on our licensee’s knowing who their customers are.
Software that reliably helps them to do that easily, at the same time as
reducing bureaucratic burdens on customers and supporting a focus on key
risks, would be most welcome. The important thing for us is that the process is
understood by the company using it and is fit for purpose given the profile of
the client base.
Samantha Barrass, Chief Executive Officer, Gibraltar Financial Services
Commission
Conclusion
Social KYC provides both regulated and non-regulated firms with an additional tool
to address and mitigate fraud, manage money laundering and terrorist financing
risk, and manage reputational risk. For forward-thinking firms social checks are a
cost-effective and robust way to enhance the risk-based approach, and can have a
significant positive impact on the customer onboarding process, especially within
market segments that traditional identity solutions do not adequately cover or where
they are deficient.
With approximately three-quarters of the global internet population actively using
social media7
it is possible to implement robust, risk-based KYC without needing to
lose users in the process. Use of Social KYC reduces friction and enables greater
confidence and trust with online transactions. It is also a key part of and stage in the
trend to federated KYC. Veridu and Ramparts European Law Firm would be delighted
to work with you to bring about the change we wish to see in the world.
Stop losing customers to outdated KYC Processes
7
Source: http://www.emarketer.com/article.aspx?R=1009976
2nd Floor,
3 Hardman Square,
Spinningfields,
Manchester, M3 3EB
Tel: +44 (0)161 9149785
1 Fore Street,
London EC2Y 5EJ,
hello@veridu.com,
www.veridu.com,
@veriduHQ