Implementing Video KYC Compliance involves more than merely integrating a video chat interface into your customer onboarding process. It represents a significant organizational shift that requires comprehensive changes to your existing procedures and infrastructure. Companies will inevitably experience phases of incorrect implementation, followed by phases where they are neither entirely wrong nor entirely right, before […]
Video KYC Process – A simple use case flow
A high level flow of how the Video KYC call is initiated between the Agent and the Customer.
Video KYC – Common questions our customers ask
In the midst of an unprecedented crisis, it is emerging that the future can never really be anything like the past. With physical movements restricted and much less desired, financial institutions must rethink ways to onboard their customers safely and securely. On 09 January 2020, the Indian financial regulator made a remarkable amendment to the […]
Video KYC Deployment Steps
Following the comprehensive Video KYC FAQ, here is a quick summary of how to deploy the Video KYC solution into your client onboarding flow to remain compliant with the steps specified by the regulator. The Video KYC process can be split into three pillars (Before, During and After) taken from the V-CIP process defined in […]
Digital Identity Verification: By diverse means, we begin to understand the depth of the problem and its cure.
Identity verification seems like a natural casualty of the times. From a friendly application to a friendly nod from the Banker, the account opening steps have been turned on its head for a generation, maybe more. People scorn at the sound of paperwork and identity proofs, and for good reasons. World Bank’s Findex suggests that […]
IRSF Attack – A Case Study
International Revenue Share Fraud (IRSF) accounts for about $10.7 billion in fraud losses. Losses are up by 497% from previous year. This case study highlights the fact that there is no operator who is immune to IRSF attack. And prevention is the best form of cure as there is no cure for this malicious attack.