RapidAML Team
2024-06-18
Businesses subject to Anti-Money Laundering (AML) compliance are required to carry out a customer identification and verification process, known as ‘Know Your Customer’ (KYC), as part of the Customer Due Diligence (CDD) requirement. When such a KYC process is carried out remotely or digitally with software or an app, it is known as eKYC (electronic KYC).
Most AML compliance laws mandate that businesses, under their purview, have in place adequately formulated steps involved in carrying out eKYC. Accordingly, regulated entities must evaluate the appropriateness of tools and technology for carrying out eKYC. They must take into consideration data privacy and data protection regulations and follow the best practices in eKYC implementation in a business.
The blog also discusses eKYC use cases and the adoption of the risk-based approach in eKYC implementation.
The introduction and development of the eKYC concept resulted from businesses and regulators suffering from the pitfalls of the manual KYC process, which was time-consuming, tedious, repetitive, lacking in accuracy, and heavy on resources.
In simple words, eKYC refers to a computerised or digitised version of the conventional KYC process. eKYC entails the collection of customers’ data to identify and verify their identities.
eKYC can be performed at any given point in time, through any platform, without the need for human intervention, at the convenience of the customer.
In contrast, the traditional KYC process can be carried out only at the place of business, requiring the physical presence of the customer and the availability of essential ID documents. It also requires human input by an employee of the business during working hours, usually inconveniencing the customer by requiring a visit with the required documents.
In this digital age, businesses usually have services and customers beyond geographical boundaries; the non-face-to-face onboarding of customers has become a new normal, leading to eKYC as a solution to ensure that regulatory compliance requirements are met. eKYC process not only helps with compliance but also contributes to combing out potentially suspicious and non-verifiable, fraudulent, forged, deep-fake, or fake customer profiles or bots that are trying to disrupt usual operations. A seamless adoption of the eKYC process helps businesses safeguard customer interests and ensure long-term customer satisfaction and retention.
The steps involved in eKYC usually cover the following:
Registration/Login
Enter Personal Information
Upload Required Identity Documents (ID)
Authenticate Identity
Initiate and Ensure AML Compliance
The business is then required to initiate and ensure AML compliance through
The benefits of eKYC are listed below:
Remote Customer Onboarding
Video KYC helps businesses by enabling them to onboard any customer remotely. Customers can be verified by checking live video along with available customer information, such as photographs on the ID document, along with a liveness check and behavioural analysis. This process is automated by eKYC tools, requiring manual in-person KYC only when there is suspicion that video KYC is a deep fake or AI-generated.
Ongoing Monitoring
Ongoing monitoring of business relationships requires the software to identify and generate alerts as and when any document expiry is approaching. This enables the user of the eKYC tool to seek updated ID documents from their customers.
Document Verification
Document verification is also carried out using the eKYC tool. Many tools have APIs integrated with government, semi-government, or government-approved databases where the database of personal ID documents issued by government authorities is maintained. The eKYC tool can help with identity verification by communicating with an API and authenticating the user.
OTP-Based: For an OTP-based eKYC system, the customer’s consent is obtained to carry out the eKYC process for a specific purpose on the ID verification platform. Following this, an OTP is generated and sent to the customer’s registered mobile number associated with the digital identification document issued by any government authority. This OTP authentication helps the business in extracting customer details from the central data registry with the customer’s consent for the purpose of eKYC.
Biometric-Based Authentication: Biometric-based eKYC authentication relies on capturing biometric details such as customer retina scans or fingerprint scans and sharing them with the central registry. The central data registry or data repository then cross-verifies the biometric details with an existing database. When such biometric details are matched, the customer details, such as key identifier details, are shared to authenticate the customer.
QR Code: Scanning QR codes to extract customer key identifier details is another form of eKYC. Businesses may rely on scanners that read the QR code contained on the customer’s ID document to collect and verify identity information from the central KYC registry.
Data security refers to the measures taken by any business to ensure that its digital data are safeguarded from unauthorised access, misuse, theft, corruption, embezzlement, and other crimes. Data Security measures cover hardware, software, cloud storage devices, user devices, and access and administrative controls.
Any business that uses digital systems must ideally have an adequate and appropriate data security policy and procedures in place. The policies and procedures should cover how the organisation plans to use, handle, store, disseminate, and safeguard its own data and its customers’ data. Failing to do so will result in regulatory penalties.
As eKYC deals with customer data, businesses need to store the personal data of their clients to ensure compliance with record-keeping requirements. Businesses need to ensure that their customers’ personal data is safeguarded adequately.
Businesses must ensure that data security measures are covered in their Data Security Policy, where the provisions are made to safeguard their data on hardware and software. The confidentiality, integrity, and availability of data should not be compromised.
eKYC process involves the collection of personal data of individuals and corporate entities. Whenever there is involvement of personal data of individuals, the immediate concern arises about safeguarding personal data privacy. With several instances of impersonation, identity theft, and misuse of personal data, countries across the world felt the need to have adequate data privacy and data protection laws in place.
Data privacy laws are important as they contribute towards upholding the basic principle of human rights, which is the right to privacy. Data privacy laws assist individuals in exercising their rights over their personal data, its use, storage, and dissemination. Data privacy laws vary from country to country. However, the fundamental pillars of data privacy laws require businesses to ensure:
Some of the Data Privacy legislations that businesses need to consider when conducting business overseas are:
Global Data Privacy Legislations |
|
China
|
· The Cybersecurity Law (C.S.L.)
· The Personal Information Protection Law (PIPL) · Data Security Law (DSL) |
European Union | · General Data Protection Regulation (EU GDPR) |
India | · Digital Personal Data Protection (DPDP) Act, 2023 |
Japan | · The Act on the Protection of Personal Information (APPI) |
Nigeria | · Nigeria Data Protection Regulation, 2019 (NDPR) |
Singapore | · The Personal Data Protection Act (PDPA) |
United Arab Emirates | · The Personal Data Protection Law, UAE, Federal Decree-Law No. 45 of 2021, regarding the Protection of Personal Data |
United Kingdom | · The Data Protection Act 2018
· UK General Data Protection Regulation (GDPR) |
United States of America:
|
· California Consumer Privacy Act (CCPA)
· The California Privacy Rights Act of 2020 (CPRA) · Biometric Privacy Laws [Illinois Biometric Protection Act (BIPA)] · Consumer Data Protection Act (CDPA) – Virginia |
The requirement to carry out CDD forms part of the AML regulations worldwide. Whether in the banking sector or non-financial businesses and professions, CDD and KYC are mandatory. The regulations governing eKYC and allied laws are the same as those governing CDD.
Global eKYC Regulatory Framework |
|
China
|
· Anti-money Laundering Regulations
· Anti-Money Laundering Law of the People’s Republic of China (PRC) |
European Union | · Revision of the Anti-Money Laundering Directive (AMLD6)
· The Anti-Money Laundering Authority (AMLA) regulation · eIDAS 2: European Digital Identity Regulation (Regulation (EU) 2024/1183) |
India | · PMLA (Prevention of Money Laundering Act), 2002
· The Reserve Bank of India (RBI) Know Your Customer (KYC) and AML guidelines · International Financial Services Centres Authority (Anti Money Laundering, Counter-Terrorist Financing and Know Your Customer) Guidelines, 2022 |
Japan | · Act on Prevention of Transfer of Criminal Proceeds (APTCP)
· Foreign Exchange and Foreign Trade Act (FEFTA) · Act on Punishment of Organised Crimes and Control of Proceeds of Crime (APOC) · Act on Punishment of Financing to Offences of Public Intimidation (TF Act) · Terrorist Asset-Freezing Act (TAFA) |
Nigeria | · Money Laundering (Prevention and Prohibition) Act, 2022
· Terrorism (Prevention and Prohibition) Act, 2022 · Regulation for the Implementation of Targeted Financial Sanctions on Proliferation Financing · Regulation for the Implementation of Targeted Financial Sanctions on Terrorism, Terrorism Financing and Other Related Measures, 2022 |
Singapore | · Terrorism (Suppression of Financing) Act 2002
· Corruption, Drug Trafficking and Other Serious Crimes (Confiscation of Benefits) Act · The Precious Stones and Precious Metals (Prevention of Money Laundering and Terrorism Financing) Act 2019 (“PSPM Act”) |
United Arab Emirates | · Federal Decree-Law No. (20) of 2018 On Anti-Money Laundering and Combating the Financing of Terrorism and Financing of Illegal Organisations (as amended by Federal Decree Law No. (26) of 2021)
· Cabinet Decision No. (10) of 2019 Concerning the Implementing Regulation of Decree-Law No. (20) of 2018 On Anti-Money Laundering and Combating the Financing of Terrorism and Illegal Organisations (as amended by Cabinet Resolution No. (24) of 2022) |
United Kingdom | · Proceeds of Crime Act 2002
· The Money Laundering, Terrorist Financing and Transfer of Funds (Information on the Payer) Regulations 2017 · Sanctions and Anti-Money Laundering Act 2018 · Economic Crime (Transparency and Enforcement) Act 2022 · The Electronic Identification and Trust Services for Electronic Transactions (Amendment, etc.) (EU Exit) Regulations 2019 |
United States of America
|
· Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism (USA PATRIOT) Act of 2001.
· Bank Secrecy Act/ Anti-Money Laundering (BSA/AML) · Customer Due Diligence (CDD) Final Rule |
A successful eKYC implementation requires customer participation in the process. Sometimes due to the lack of technology awareness, software glitches, and complicated video verification processes, customers stay away from eKYC procedures.
One of the major consumer grievances that businesses face is that customers either don’t understand the importance of providing businesses with their personal information or don’t feel that they have any control over their personal information once it is shared for eKYC purposes. eKYC measures such as biometric scanning by retinal scan, fingerprint scan, or OTP authentication sometimes make customers nervous about cooperating with eKYC procedures, thinking that their personal or biometric details might be misused or sold.
Customers’ approach to cooperation with eKYC completion shall remain suspicious and rigid until businesses themselves take measures to raise customer awareness regarding the eKYC implementation. Businesses need to make their customers aware of the data security and data privacy measures taken during the implementation of the eKYC.
Businesses must keep in mind the fundamentals of a risk-based approach (RBA). RBA requires businesses to apply Money Laundering, Financing of Terrorism, and Proliferation Financing (ML/FT and PF) risk-mitigation measures according to the degree to which they are exposed to ML/FT and PF risks.
To simplify the concept of RBA, one may take an example of how heavily guarded and protected nuclear reactors in most countries are due to the sensitivity and vulnerability of nuclear material and the potential threat of destruction. However, the same amount of security isn’t provided to any public library or a public park as the degree of FT and PF risk and accompanied threat of destruction is significantly lesser than that of the FT and PF risk the nuclear reactor faces.
Similarly, in the case of eKYC implementation, the appropriate use of RBA would require the business to consider whether the eKYC software is compliant with relevant laws and regulations.
This can be illustrated by considering that if a business’s customer base consists of mostly high-net-worth individuals and their eKYC tool doesn’t offer integration with name-screening tools for screening sanctioned, politically exposed persons (PEPs) and adverse media checks, then using such an eKYC tool would be very risky as high-net-worth individuals are usually influential and their probability of being a PEP or their names coming in adverse media checks is much higher than same sample size of lower or medium-income individuals.
Businesses also need to ensure that the eKYC tool they are using or planning to switch to is viable for their specific line of business and relevant to their sector. Businesses must be mindful that they do not make the error of using eKYC tools that do not meet their specific needs.
The eKYC software should be customisable to suit business needs; otherwise, it will not deliver the desired and required results, leaving it underutilised.
1. Uneven Jurisdictional Requirements: Implementing eKYC is challenging as laws concerning KYC requirements vary from country to country. Uneven jurisdictional requirements lead to variations in record-keeping requirements and different eKYC checklists, making eKYC implementation difficult.
2. Data Privacy and Data Security Concerns: Businesses need to overcome the challenge of consent-related considerations and comply with biometric regulations which restrict, limit, and govern the use of biometric information.
3. Unidentifiable Vulnerabilities: Due to the element of remote customer onboarding, the eKYC system remains vulnerable to exploitation by elements such as deep fake AI that gives the false impression of an actual person fulfilling eKYC requirements or answering questions. Vulnerabilities also come from the use of malware, the possibility of data breaches, and cyberattacks by criminals.
4. Non-Integration Across Tools: Not all eKYC software comes with the feature of integration with existing systems in an organisation, making it difficult for businesses to streamline processes.
5. Obtaining Information from High-Risk Customers: Many times, despite having a well-integrated eKYC software that offers seamless customer onboarding service, a customer posing a high risk, such as a Politically Exposed Person (PEP) or UBOs of businesses having multiple layers of corporate ownership, does not cooperate with timely completion of eKYC process.
1. Formulation and Implementation of AML Policy and Data Protection Policy:
The effective and adequate implementation of any program, tool, or compliance process requires it to be included in a well-drawn-out AML compliance policy along with procedures, systems, and controls. An AML compliance policy must provide for the customer onboarding process and methodology, the eKYC process and tools used, and the handling of customer relationships when suspicious activities and reports are filed. The AML compliance policy must also provide for a Customer Identification Program (CIP). The AML policy must provide for risk assessment and management (due diligence, part of the KYC process), ongoing monitoring, and record-keeping of eKYC measures taken.
Further, the company must carve out and implement a data protection policy to remain compliant with legal requirements.
2. Consider Data Security Measures:
Businesses must implement tight data security measures to prevent incidences like hacking. The entire IT infrastructure needs to be planned, and security measures must be given due consideration.
3. Relying on Third-Party for eKYC:
Businesses must ensure that if they rely on third parties to fulfil their eKYC needs, the responsibility for data breaches or data loss will remain with the business itself, not the third party.
4. Group Oversight:
Businesses must consider that they have uniformity across branches and subsidiaries or sister concerns when implementing eKYC tools. The policies and procedures concerning eKYC should be as uniform as possible, or in cases where laws are distinct, as a best practice, following more stringent laws is advisable.
5. Integration and Interoperability
As a best practice, to ensure a more streamlined workflow across platforms such as CRM, payroll, accounting, name screening, AML case management, and eKYC tool, it is preferable to integrate these tools to avoid duplication of efforts.
Geolocation Tagging: Technology or features such as geolocation, IP addresses, and keying patterns can be combined to verify users of eKYC software or apps.
Near-Field Communication (NFC): NFC readability can be used to capture data stored on an ID chip and extract data stored on the ID document. Further, blockchain technology can be used to safeguard customers’ personal data.
Advanced Liveness Detection: Advanced liveness detection techniques help in identifying deep fake or AI-generated profiles trying to defraud eKYC systems. Advanced liveness detection observes signs of life that are distinct from AI-generated models. Advanced liveness check analyses the subject’s environment in a contextual manner along with behavioural analysis to achieve accurate results.
Conclusion
Conducting KYC is a mandatory requirement across the globe. Regulated entities rely on the eKYC process to fulfil their identification document collection and verification requirements. However, a tick-box approach of simply purchasing or subscribing to an eKYC tool is not enough. Businesses need to follow a risk-based approach while implementing an eKYC tool.
By following the fundamentals of a risk-based approach, businesses must implement relevant and viable eKYC software that takes care of its compliance requirements and suits their individual business needs while making the most of advancements in eKYC technology.
Pathik is a Chartered Accountant with over 26 years of experience in governance, risk, and compliance. He helps companies with end-to-end AML compliance services, from conducting Enterprise-Wide Risk Assessments to implementing robust AML compliance frameworks. He has played a pivotal role as a functional expert in developing and implementing RegTech solutions for streamlined compliance.
Pathik's expertise extends to guiding businesses in navigating complex regulatory landscapes, ensuring adherence to FATF and other international standards, and mitigating financial crime risks. He is a recognised thought leader in AML/CFT, frequently sharing insights on emerging compliance challenges on various platforms.
Join our Waitlist