{"id":7235,"date":"2022-08-05T09:11:07","date_gmt":"2022-08-05T09:11:07","guid":{"rendered":"https:\/\/signdesk.com\/in\/?p=7235"},"modified":"2025-09-17T07:31:13","modified_gmt":"2025-09-17T13:01:13","slug":"all-about-kyc-verification","status":"publish","type":"post","link":"https:\/\/melento.ai\/en-in\/blog\/all-about-kyc-verification","title":{"rendered":"What Is KYC Verification? Everything You Need To Know About KYC Verification"},"content":{"rendered":"<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">Know Your Customer or KYC is a set of protocols designed to verify the identity of a client or entity before conducting business with them. The KYC process typically involves collecting certain information from a prospective client, verifying this information to ensure veracity, and then using this information to estimate the potential business risk of onboarding the client.<\/span><\/p>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">The<strong> <a style=\"color: #333333;\" href=\"https:\/\/signdesk.com\/digital-kyc\">KYC verification process<\/a><\/strong><span style=\"font-weight: 400;\"> is required by <a href=\"https:\/\/melento.ai\/en-in\/blog\/money-laundering-stages\">Anti-Money Laundering<\/a> (AML) and Terrorist Financing (TF) protocols the world over to combat illicit activities and financial crime. KYC checks also play a prominent role in data management, workflow automation, and risk management. The KYC information collected from clients can be analyzed to estimate potential risks and create risk profiles.\u00a0<\/span><\/span><\/p>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">The difference in efficiency when leveraging <strong>KYC verification<\/strong> is also sizeable. KYC verification APIs enable businesses to retrieve and verify client KYC almost instantly, with secure verification workflows and easy integration capabilities.<\/span><\/p>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">KYC verification is not a monolith and may be sub-divided into its constituent processes.<\/span><\/p>\n<h3><span style=\"text-align: justify; font-size: 22px; font-family: 'open sans'; color: #2c5363;\"><b>The Key Components of KYC Verification\u00a0<\/b><\/span><\/h3>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">Any KYC verification procedure will consist of four critical components, determining the steps involved in a KYC check. These components are mandated differently according to jurisdictional AML requirements, but the components themselves are unchanging across geographies and industry segments.<\/span><\/p>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">The four components of every KYC verification process, are &#8211;<\/span><\/p>\n<h4><span style=\"text-align: justify; font-size: 18px; font-family: 'open sans'; color: #333333;\"><b>Customer Acceptance Policy<\/b><\/span><\/h4>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">The first step required to undertake KYC verification is creating a policy. The customer acceptance policy outlines how the business or organization will verify clients, and the rules to be followed while onboarding a new customer.<\/span><\/p>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">The customer policy mentions the criteria to be used for verification, which documents are acceptable, and other requirements to be adhered to during KYC verification.<\/span><\/p>\n<h4><span style=\"text-align: justify; font-size: 18px; font-family: 'open sans'; color: #333333;\"><b>Customer Identification Program (CIP)<\/b><\/span><\/h4>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">The next component in KYC verification involves collecting identifying information from a customer and verifying this information to ensure authenticity. The modes to be used for verification such as OCR, APIs, AI-powered document verification, etc, are also laid out in the CIP.<\/span><\/p>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">The minimum information businesses would require for CIP include &#8211; Name, Date of Birth, Address, and ID number.<\/span><\/p>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">Customer identification may be performed using three criteria &#8211;<\/span><\/p>\n<ol>\n<li><span style=\"color: #333333;\"><b>Possession<\/b><span style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"> &#8211; The customer is verified using something he or she possesses. This could be a photo ID, Officially Valid Documents (OVDs), an OTP received on the customer\u2019s Aadhaar-registered number, etc.\u00a0<\/span><\/span><\/li>\n<li><span style=\"color: #333333;\"><b>Inherence<\/b><span style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"> &#8211; The customer is verified using something that he or she is. This usually refers to a unique biological criterion such as fingerprints, retina, iris, etc.\u00a0<\/span><\/span><\/li>\n<li><span style=\"color: #333333;\"><b>Knowledge<\/b><span style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"> &#8211; The customer is verified using something he or she knows. This could be a password, a private key, a pin, etc.\u00a0<\/span><\/span><\/li>\n<\/ol>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">The most commonly used methods to verify individual customers involve furnishing government-issued identification such as &#8211;<\/span><\/p>\n<ul>\n<li style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">Voter ID<\/span><\/li>\n<li style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">Passport<\/span><\/li>\n<li style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">Driving Licence<\/span><\/li>\n<li style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">PAN<\/span><\/li>\n<li style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">Aadhaar<\/span><\/li>\n<li style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">GST certificate<\/span><\/li>\n<\/ul>\n<p><span style=\"text-align: justify; font-size: 17px; font-family: 'open sans'; color: #333333;\"><strong>For businesses, the CIP usually requires<\/strong> &#8211;\u00a0<\/span><\/p>\n<ul>\n<li style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">Certificates of Incorporation<\/span><\/li>\n<li style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">CIN \/ DIN<\/span><\/li>\n<li style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">Partnership agreements<\/span><\/li>\n<li style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">Business Licenses<\/span><\/li>\n<\/ul>\n<h4><span style=\"text-align: justify; font-size: 18px; font-family: 'open sans'; color: #333333;\"><b>Customer Due Diligence (CDD)<\/b><\/span><\/h4>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">The third component of <strong>KYC verification<\/strong> involves performing due diligence procedures for verified customers. Regulated businesses are required to conduct extensive assessments and scoring to anticipate the level of risk potentially posed to the business.<\/span><\/p>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">CDD regimes can be classified into three types &#8211;<\/span><\/p>\n<ul>\n<li style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\"><b>Simplified Due Diligence\u00a0<\/b><\/span><\/li>\n<\/ul>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">Simplified CDD is undertaken for low-value accounts where risks of money laundering are low.<\/span><\/p>\n<ul>\n<li style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\"><b>Basic Due Diligence<\/b><\/span><\/li>\n<\/ul>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">This is the required level of due diligence to be performed when money laundering risks are not low enough to warrant simplified due diligence.<\/span><\/p>\n<ul>\n<li style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\"><b>Enhanced Due Diligence\u00a0<\/b><\/span><\/li>\n<\/ul>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">This is conducted when Financial Institutions (FIs) need detailed information regarding the customer\u2019s transactions and financial activities. Politically Exposed Persons( PEPs) typically require enhanced due diligence.<\/span><\/p>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\"><b>Transaction &amp; Activity Monitoring<\/b><\/span><\/p>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">Finally, FIs must continuously monitor the transactions of clients for anomalous activities, capital transfer patterns indicating money laundering, or any activity that might warrant a Suspicious Activity Report (SAR).<\/span><\/p>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">SARs are routinely sent to regulatory bodies for further action.<\/span><\/p>\n<h2><span style=\"text-align: justify; font-size: 24px; font-family: 'open sans'; color: #2c5363;\"><b><b>Types of KYC Verification<\/b><\/b><\/span><\/h2>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">KYC verification can be performed in a number of ways, each with its own set of drawbacks and advantages.<\/span><\/p>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">Here are the most prevalent types of KYC verification.<\/span><\/p>\n<p><span style=\"color: #333333;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-7242\" src=\"https:\/\/melento.ai\/en-in\/blog\/wp-content\/uploads\/2022\/08\/Everything-You-Need-To-Know-About-KYC-Verification-02.jpg\" alt=\"Types of kyc verification\" width=\"1604\" height=\"750\" \/><\/span><\/p>\n<p><span style=\"text-align: justify; font-size: 17px; font-family: 'open sans'; color: #333333;\"><b>Manual KYC<\/b><\/span><\/p>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">This is the form of KYC verification most people are familiar with. In manual KYC, customers provide paper-based IDs and documents to an FI. These IDs are then manually verified, copied, and stored.<\/span><\/p>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">Once the customer\u2019s KYC information is verified, manual KYC is completed. This process typically takes several weeks to complete and often results in lost documents, errors in data collection, and inefficient onboarding cycles.<\/span><\/p>\n<p><span style=\"text-align: justify; font-size: 17px; font-family: 'open sans'; color: #333333;\"><b>eKYC<\/b><\/span><\/p>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">Electronic KYC or eKYC is a quick and paperless verification process that makes use of the UIDAI Aadhaar database to verify customer identities. The demographic and biometric information of all Aadhaar holders is stored in the UIDAI database and leveraged to quickly retrieve information for KYC verification.<\/span><\/p>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">eKYC can be completed using OTP-based authentication, biometric verification, or offline methods. The latter includes extracting information from a downloadable Aadhaar XML file or scanning the QR code present on any Aadhaar card.<\/span><\/p>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">Accounts opened after just eKYC verification are usually called half KYC accounts and have several restrictions, with most FIs requiring customers to complete full KYC within a year of opening the account.<\/span><\/p>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">Read all about eKYC<strong><span style=\"color: #800080;\"> <a style=\"color: #800080;\" href=\"https:\/\/melento.ai\/en-in\/blog\/ekyc-explained-all-you-need-to-know-about-ekyc\"><b>here<\/b><\/a>.<\/span>\u00a0<\/strong><\/span><\/p>\n<p><span style=\"text-align: justify; font-size: 17px; font-family: 'open sans'; color: #333333;\"><b>cKYC<\/b><\/span><\/p>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">Central KYC or cKYC is a paper-based method for KYC verification created to remove the redundancies present in the regular KYC process. To complete cKYC, clients must send copies of the cKYC form, proof of identity, proof of address, and a photograph to an FI, KRA, distributor, or an AMC.<\/span><\/p>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">Once this information is verified by the <span style=\"font-weight: 400;\">Central Registry of Securitisation, Asset Reconstruction and Security Interest of India (CERSAI), it\u2019s stored in the Central KYC Records Registry (CKYCR) where it will be available for future KYC verification.\u00a0<\/span><\/span><\/p>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">The customer will then receive a 14-digit KYC Identification Number (KIN) on their mobile number, which can be provided to any FI for instant KYC verification. This means that with cKYC, customers need to verify their KYC just once.<\/span><\/p>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">Read all about cKYC<strong><span style=\"color: #800080;\"> <a style=\"color: #800080;\" href=\"https:\/\/melento.ai\/en-in\/blog\/everything-you-need-to-know-about-ckyc\"><b>here<\/b><\/a>.<\/span>\u00a0<\/strong><\/span><\/p>\n<p><span style=\"text-align: justify; font-size: 17px; font-family: 'open sans'; color: #333333;\"><b>Video KYC<\/b><\/span><\/p>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">Video-based KYC verification is the most robust iteration of <strong>KYC verification<\/strong> yet. Introduced in 2020, Video KYC is an AI-powered and completely digital method for FIs to verify customer KYC instantly and remotely.<\/span><\/p>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">Video KYC involves video-based interactions between customers and executives from FIs, where the customer\u2019s identity is verified using facial matching techniques. KYC documents are validated by capturing live images of these documents and using OCR technology to extract KYC data. AI-powered verification algorithms verify these data against information retrieved from databases using APIs and authenticate customer identity within minutes.<\/span><\/p>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">Video KYC takes different forms based on the industry segment and regulator in charge. Banks and NBFCs, for example, must comply with the protocols of the Video-based Customer Identification Program (V-CIP). While insurers and investment firms have their own versions of Video KYC.<\/span><\/p>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">Learn all you need to know about Video KYC<strong><span style=\"color: #800080;\"> <a style=\"color: #800080;\" href=\"https:\/\/melento.ai\/en-in\/blog\/everything-you-need-to-know-about-video-kyc\"><b>here<\/b><\/a>.<\/span>\u00a0<\/strong><\/span><\/p>\n<div align=\"center\"><span style=\"color: #333333;\"><a style=\"color: #333333;\" href=\"https:\/\/melento.ai\/en-in\/talk-to-sales\"><button class=\"wpcf7-form-control wpcf7-submit envor-btn envor-btn-primary envor-btn-normal\" type=\"button\"><strong>Book a Free Demo <\/strong><\/button><\/a><\/span><\/div>\n<h3><\/h3>\n<h3><span style=\"text-align: justify; font-size: 22px; font-family: 'open sans'; color: #2c5363;\"><b><b>What is the Purpose of KYC Verification?<\/b><\/b><\/span><\/h3>\n<ul>\n<li style=\"text-align: justify; font-size: 18px; font-family: 'open sans';\"><span style=\"color: #333333;\"><b>Prevention of money laundering &amp; financial crime<\/b><\/span><\/li>\n<\/ul>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">Combating illicit financial activities and cutting off terrorism financing are two of the main objectives of KYC verification.<\/span><\/p>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">Money laundering can occur unencumbered when banks and FIs are unaware of who exactly possesses an account with them, how money is being transferred, and where it\u2019s going to or coming from. KYC verification takes the shroud off of criminal activities and exposes them to the authorities.<\/span><\/p>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">Criminal organizations frequently rely on money laundering to \u201cclean up\u201d ill-gotten money in both organized and unorganized sectors. Professional Money Laundering Organizations (PMLOs) employ bulk cash smuggling to pick up and transport funds connected with drug trafficking, human smuggling, cybercrime, or other criminal activities.<\/span><\/p>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">This money is then deposited in the retail banking system following which the money is laundered using casinos, front companies, and domestic or foreign bank accounts.<\/span><\/p>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">Strong KYC verification nips money laundering in the bud either at the customer identification stage or via the monitoring of suspicious account activities.<\/span><\/p>\n<ul>\n<li style=\"text-align: justify; font-size: 18px; font-family: 'open sans';\"><span style=\"color: #333333;\"><b>ID fraud &amp; risk mitigation\u00a0<\/b><\/span><\/li>\n<\/ul>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">Fraud is a steadily rising challenge for FIs across the world. According to PwC, nearly 46% of companies experienced some form of fraud. If a business\u2019s revenue is greater than USD 10 billion, it\u2019s more than half as likely to have experienced attempted fraud.<\/span><\/p>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">\u00a0KYC verification is the first line of defense against fraud and cybercrime for FIs. The CIP of KYC verification ensures that clients are who they say they are, by using strong facial matching techniques and ML-enabled profile filters.<\/span><\/p>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">CDD programs also play an important role in risk mitigation, by calculating &amp; assigning risk scores to customers and enabling FIs to continuously monitor activities.<\/span><\/p>\n<ul>\n<li style=\"text-align: justify; font-size: 18px; font-family: 'open sans';\"><span style=\"color: #333333;\"><b>Data management &amp; auditing\u00a0<\/b><\/span><\/li>\n<\/ul>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">The data collected by FIs during onboarding is often disorganized and unqualified. This prevents FIs from creating client profiles for risk management and other functions.<\/span><\/p>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">KYC verification lays out protocols for data collection and management and creates a streamlined process for FIs to secure and manage customer KYC data. Additionally, KYC verification creates robust pathways for customer onboarding which increases the audit efficiency of onboarding processes and helps FIs comply with regulations.<\/span><\/p>\n<ul>\n<li style=\"text-align: justify; font-size: 18px; font-family: 'open sans';\"><span style=\"color: #333333;\"><b>Streamlined onboarding\u00a0<\/b><\/span><\/li>\n<\/ul>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">By closely following the procedures outlined in the KYC verification program, banks and NBFCs can ensure that the onboarding process is transparent and well-organized. This helps increase risk and KYC visibility while making the process easier to control and analyze.<\/span><\/p>\n<h3><span style=\"text-align: justify; font-size: 22px; font-family: 'open sans'; color: #2c5363;\"><b>Global Rules &amp; Regulations for KYC Compliance<\/b><\/span><\/h3>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">AML regulations vary by country and regulatory organization. Here\u2019s a list of a few major regulators and the main AML laws, respectively.<\/span><\/p>\n<p>&nbsp;<\/p>\n<table>\n<tbody>\n<tr>\n<td style=\"text-align: center;\"><span style=\"text-align: justify; font-size: 17px; font-family: 'open sans'; color: #333333;\"><b>Geography<\/b><\/span><\/td>\n<td style=\"text-align: center;\"><span style=\"text-align: justify; font-size: 17px; font-family: 'open sans'; color: #333333;\"><b>Regulator<\/b><\/span><\/td>\n<td style=\"text-align: center;\"><span style=\"text-align: justify; font-size: 17px; font-family: 'open sans'; color: #333333;\"><b>Main Regulation(s)<\/b><\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"text-align: justify; font-size: 17px; font-family: 'open sans'; color: #333333;\">Global<\/span><\/td>\n<td><span style=\"text-align: justify; font-size: 17px; font-family: 'open sans'; color: #333333;\">Financial Action Task Force (FATF)<\/span><\/td>\n<td><span style=\"text-align: justify; font-size: 17px; font-family: 'open sans'; color: #333333;\">FATF Standards<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"text-align: justify; font-size: 17px; font-family: 'open sans'; color: #333333;\">USA<\/span><\/td>\n<td><span style=\"text-align: justify; font-size: 17px; font-family: 'open sans'; color: #333333;\">Office of the Comptroller of the Currency (OCC)<\/span><\/td>\n<td><span style=\"text-align: justify; font-size: 17px; font-family: 'open sans'; color: #333333;\">Bank Secrecy Act, Sections of the Patriot Act<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"text-align: justify; font-size: 17px; font-family: 'open sans'; color: #333333;\">Canada<\/span><\/td>\n<td><span style=\"text-align: justify; font-size: 17px; font-family: 'open sans'; color: #333333;\">Financial Transactions &amp; Report Analysis Center of Canada (FINTRAC)<\/span><\/td>\n<td><span style=\"text-align: justify; font-size: 17px; font-family: 'open sans'; color: #333333;\">PCMLTFA<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"text-align: justify; font-size: 17px; font-family: 'open sans'; color: #333333;\">Australia<\/span><\/td>\n<td><span style=\"text-align: justify; font-size: 17px; font-family: 'open sans'; color: #333333;\">Australian Transactions Report &amp; Analysis Centre (AUSTRAC)<\/span><\/td>\n<td><span style=\"text-align: justify; font-size: 17px; font-family: 'open sans'; color: #333333;\">AML\/CTF Act, FTR Act\u00a0<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"text-align: justify; font-size: 17px; font-family: 'open sans'; color: #333333;\">European Union<\/span><\/td>\n<td><span style=\"text-align: justify; font-size: 17px; font-family: 'open sans'; color: #333333;\">European Banking Authority (EBA)<\/span><\/td>\n<td><span style=\"text-align: justify; font-size: 17px; font-family: 'open sans'; color: #333333;\">6AMLD, PSD2, MiFID II, GDPR<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"text-align: justify; font-size: 17px; font-family: 'open sans'; color: #333333;\">Hong Kong<\/span><\/td>\n<td><span style=\"text-align: justify; font-size: 17px; font-family: 'open sans'; color: #333333;\">Hong Kong Monetary Authority (HKMA)<\/span><\/td>\n<td><span style=\"text-align: justify; font-size: 17px; font-family: 'open sans'; color: #333333;\">AML &amp; CTF Ordinance\u00a0<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"text-align: justify; font-size: 17px; font-family: 'open sans'; color: #333333;\">India<\/span><\/td>\n<td><span style=\"text-align: justify; font-size: 17px; font-family: 'open sans'; color: #333333;\">Reserve Bank of India (RBI)<\/span><\/td>\n<td><span style=\"text-align: justify; font-size: 17px; font-family: 'open sans'; color: #333333;\">Prevention of Money Laundering Act, 2002<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h3><\/h3>\n<h3><span style=\"text-align: justify; font-size: 22px; font-family: 'open sans'; color: #2c5363;\"><b><b>Why Businesses Need To Verify KYC<\/b><\/b><\/span><\/h3>\n<ul>\n<li style=\"text-align: justify; font-size: 18px; font-family: 'open sans';\"><span style=\"color: #333333;\"><b>AML\/TF Compliance\u00a0<\/b><\/span><\/li>\n<\/ul>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">Businesses operating in regulated sectors are required to comply with certain AML\/TF regulations, in the absence of which compliance fines are levied.<\/span><\/p>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">Global AML compliance fines<span style=\"font-weight: 400;\"> are steadily rising and crossed USD 1.6 billion in 2021. Compliance with AML regulations has become an expensive affair for FIs, with the majority of FIs leveraging RegTech such as KYC verification technology to comply with regulatory regimes and reduce compliance fines.\u00a0<\/span><\/span><\/p>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">KYC verification is the easiest way to ensure that money laundering is mitigated and that FIs are in compliance with TF requirements.<\/span><\/p>\n<ul>\n<li style=\"text-align: justify; font-size: 18px; font-family: 'open sans';\"><span style=\"color: #333333;\"><b>Fraud Prevention\u00a0<\/b><\/span><\/li>\n<\/ul>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">Over 38% of FIs<span style=\"font-weight: 400;\"> experienced some form of cybercrime and fraud in 2021. Strong KYC verification offers FIs a comprehensive means to mitigate ID fraud. Fraudulent profile filters, ML-powered pattern detection, and DB checks all serve to root out fraudsters, fake IDs, and bad actors.\u00a0<\/span><\/span><\/p>\n<ul>\n<li style=\"text-align: justify; font-size: 18px; font-family: 'open sans';\"><span style=\"color: #333333;\"><b>Operational Efficiency\u00a0<\/b><\/span><\/li>\n<\/ul>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">Leveraging KYC verification makes the onboarding process faster, cost-effective, and more efficient. Banks &amp; FIs schedule KYC verification flexibly using scheduling capabilities, collect and verify KYC data online using KYC verification APIs, and onboard clients en masse.<\/span><\/p>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">KYC verification enables businesses to boost onboarding and documentation efficiency while reducing KYC expenses and mitigating AML compliance fines.<\/span><\/p>\n<ul>\n<li style=\"text-align: justify; font-size: 18px; font-family: 'open sans';\"><span style=\"color: #333333;\"><b>Risk Management &amp; Smarter Decision-Making\u00a0<\/b><\/span><\/li>\n<\/ul>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">Risk management is one of the most important factors for regulated businesses today. Poor risk management practices result in both extensive fines and loss of reputation.<\/span><\/p>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">KYC verification checks help businesses identify fraud and AML risks well ahead of time through ML-enabled profile filters, facial matching techniques, and DB checks. These data also help executives and managers make more prescient onboarding decisions<\/span><\/p>\n<ul>\n<li style=\"text-align: justify; font-size: 18px; font-family: 'open sans';\"><span style=\"color: #333333;\"><b>Financial Inclusion<\/b><\/span><\/li>\n<\/ul>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">Regulatory bodies require banks and FIs to have stringent KYC procedures in place such as Enhanced Due Diligence, to lower overall risk and prevent financial crime. However, these procedures often result in several sections of the population being deprived of inclusion in the formal economy due to several factors such as a lack of access, lack of financial literacy, or a lack of infrastructure.<\/span><\/p>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">By leveraging KYC verification solutions, banks and FIs can onboard clients without requiring them to travel to business offices. Clients also needn\u2019t fill out several forms, make copies of their KYC documents, or even carry these important documents around.<\/span><\/p>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">KYC verification solutions such as KYC verification APIs enable FIs to remotely and seamlessly onboard customers, bring them into the ranks of the formal economy, and offer key services such as credit access.<\/span><\/p>\n<h2><span style=\"text-align: justify; font-size: 24px; font-family: 'open sans'; color: #2c5363;\"><b>Digital Onboarding with KYC Verification &#8211; How it Works<\/b><\/span><\/h2>\n<p><span style=\"text-align: justify; font-size: 18px; font-family: 'open sans'; color: #333333;\"><b>eKYC<\/b><\/span><\/p>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">eKYC is among the most straightforward forms of KYC verification and can be completed in the following ways.<\/span><\/p>\n<p><span style=\"text-align: justify; font-size: 18px; font-family: 'open sans'; color: #333333;\"><b>Online eKYC<\/b><\/span><\/p>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">The steps involved in online eKYC are &#8211;<\/span><\/p>\n<ol>\n<li style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">The client is invited for an eKYC session by sharing an invite via email or SMS<\/span><\/li>\n<li style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">The client provides their consent for eKYC and proceeds for KYC verification<\/span><\/li>\n<li style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">The client enters their Aadhaar number to generate an OTP<\/span><\/li>\n<li style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">The OTP is sent to the client\u2019s Aadhaar-registered mobile number and email address.<\/span><\/li>\n<li style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">The client enters this OTP to verify their KYC<\/span><\/li>\n<li style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">In the back-end, the client\u2019s KYC details are pulled from the UIDAI database and used to verify the information provided by the client to the business or FI that\u2019s verifying them.<\/span><\/li>\n<li style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">Once the client\u2019s KYC is verified, eKYC is completed.<\/span><\/li>\n<\/ol>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">Online eKYC can be conducted with ease using <strong><a style=\"color: #333333;\" href=\"https:\/\/signdesk.com\/digital-kyc\">KYC verification APIs<\/a>.\u00a0<\/strong><\/span><\/p>\n<p><span style=\"text-align: justify; font-size: 18px; font-family: 'open sans';\"><span style=\"color: #333333;\"><b>Offline eKYC<\/b><\/span><\/span><\/p>\n<p><span style=\"text-align: justify; font-size: 17px; font-family: 'open sans'; color: #333333;\">Offline eKYC can be conducted in two ways.\u00a0<\/span><\/p>\n<ul>\n<li style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\"><b>Aadhaar XML verification<\/b><\/span><\/li>\n<\/ul>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">This method of offline KYC verification employs Aadhaar verification APIs. Here, the client simply enters their Aadhaar number and the corresponding OTP into the KYC portal.<\/span><\/p>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">These data are used as input to download and decrypt the client-specific Aadhaar XML file. This reveals KYC information such as the client\u2019s full name, address, date of birth, and more.<\/span><\/p>\n<ul>\n<li style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\"><b>Aadhaar QR code verification\u00a0<\/b><\/span><\/li>\n<\/ul>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">This method simply involves scanning the QR code present on every Aadhaar card. This QR code scan retrieves the client\u2019s KYC information, which is then used for offline KYC verification.<\/span><\/p>\n<p><span style=\"text-align: justify; font-size: 18px; font-family: 'open sans'; color: #333333;\"><b>cKYC<\/b><\/span><\/p>\n<p><span style=\"text-align: justify; font-size: 17px; font-family: 'open sans'; color: #333333;\">KYC verification with cKYC involves the following steps.\u00a0<\/span><\/p>\n<ol>\n<li style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">Since cKYC is paper-based, the client first fills up the cKYC form, attaches a proof of address, proof of identity, and a self-attested photograph with this form, and sends these to CERSAI.<\/span><\/li>\n<li style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">After an initial verification process, the client\u2019s cKYC is verified. A unique KIN is provided to the client and the KYC information is stored in the CKYCR.<\/span><\/li>\n<li style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">The client simply needs to provide their KIN for the next KYC verification cycle. Any bank, insurer, or investment firm can use the KIN to retrieve the client\u2019s KYC data and verify these instantly.<\/span><\/li>\n<\/ol>\n<p><span style=\"text-align: justify; font-size: 18px; font-family: 'open sans'; color: #333333;\"><b>Biometric KYC Verification<\/b><\/span><\/p>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">Verifying client KYC using biometric factors is extremely useful, especially in states with low digital penetration where administrative systems are not robust enough. The steps involved are as follows.<\/span><\/p>\n<ol>\n<li style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">During Aadhaar registration, the biometric data of clients is collected. These include retina and iris scans, facial scans, fingerprint scans, and more. These data are stored in the UIDAI database.<\/span><\/li>\n<li style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">To verify eKYC, biometric scanners are used to scan the client\u2019s features.<\/span><\/li>\n<li style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">If the biometric scan matches the data stored for the client, the FI is permitted to retrieve the client\u2019s KYC information and verify these against the information provided.<\/span><\/li>\n<li style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">eKYC is completed after client KYC is verified in this way.<\/span><\/li>\n<\/ol>\n<p><span style=\"text-align: justify; font-size: 18px; font-family: 'open sans'; color: #333333;\"><b>Video-based KYC Verification\u00a0<\/b><\/span><\/p>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">The latest iteration of KYC verification is video-based verification, a comprehensive and completely online form of KYC verification.<\/span><\/p>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">Video KYC verification was introduced recently in 2020, and is leveraged differently in different industry segments. In banking, for example, FIs must follow the Video-based Customer Identification Procedure (V-CIP). Insurers and securities firms need to adhere to VBIP and <a href=\"https:\/\/melento.ai\/en-in\/blog\/vipv-enabled-video-kyc-for-mutual-funds\">VIPV<\/a> respectively.<\/span><\/p>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">Video KYC verification involves a video-based interaction between an official from the FI and the customer. The official verifies the client\u2019s KYC documents in real-time on this call and conducts a Q &amp; A session with the client using randomized system-generated questions. <\/span><\/p>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">This procedure checks for liveliness and ensures the client\u2019s presence. The various versions of Video KYC involve slight variations in the process but the basic outline remains the same.<\/span><\/p>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">Video KYC can be conducted either with the assistance of an official from the FI, or it can be conducted without assistance in what is called self onboarding.<\/span><\/p>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">While these procedures are not exactly alike, they share a similar skeletal structure. Here are the steps involved in assisted Video-based KYC verification, broadly speaking.<\/span><\/p>\n<ol>\n<li style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">The client is invited for Video KYC via email or SMS. The client consents to the procedure and logs in.<\/span><\/li>\n<li style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">The client uploads digital copies of their KYC documents. These could be a PAN card, Aadhaar card, Passport, Driving Licence, Voter ID, etc.<\/span><\/li>\n<li style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">Once these documents are uploaded, the official begins a video call with the client.<\/span><\/li>\n<li style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">The client holds up their original KYC documents and live images are captured.<\/span><\/li>\n<li style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">The official then begins the liveliness check by asking the client a round of questions.<\/span><\/li>\n<li style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">The official finally captures a live picture of the client and ends the call.<\/span><\/li>\n<li style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">In the backend, AI algorithms and OCR are used to extract data from the captured images. APIs retrieve KYC data from DBs and these are used to verify the details provided.<\/span><\/li>\n<li style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">If the KYC verification is a success, the client is onboarded. Otherwise, the official can choose to re-start the Video KYC process.<\/span><\/li>\n<\/ol>\n<h2><span style=\"text-align: justify; font-size: 24px; font-family: 'open sans'; color: #2c5363;\"><b>Industry Use Cases for KYC Verification\u00a0<\/b><\/span><\/h2>\n<h4><span style=\"text-align: justify; font-size: 19px; font-family: 'open sans'; color: #333333;\"><b>BFSI<\/b><\/span><\/h4>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">The BFSI sector is among the most tightly regulated and for good reason. FIs are frequently targeted by hackers and criminals for money laundering, fraud, and other financial crimes. Additionally, FIs need to manage voluminous amounts of customer KYC data for risk management and CDD purposes.<\/span><\/p>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">Onboarding is also a major factor in business growth and operational challenges in KYC verification are a major cause of inefficiencies and business loss for FIs.<\/span><\/p>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">Banks and NBFCs require robust <strong>KYC verification<\/strong> to onboard clients securely and in a scalable fashion. Video KYC in particular helps FIs maintain high standards of CDD via facial matching and AI-powered ID verification.<\/span><\/p>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">Video KYC also offers a separate auditing portal for FIs to maintain compliance. Melento (Formerly SignDesk)\u2019s Video KYC solution is compliant with VCIP, VBIP &amp; VIPV regulations, and offers FIs an instant and secure method to verify and onboard customers en masse.<span style=\"color: #800080;\">\u00a0<strong><a style=\"color: #800080;\" href=\"https:\/\/melento.ai\/en-in\/blog\/kyc-verification\">Read more<\/a>.\u00a0<\/strong><\/span><\/span><\/p>\n<h4><span style=\"text-align: justify; font-size: 19px; font-family: 'open sans'; color: #333333;\"><b>Retail &amp; FMCG<\/b><\/span><\/h4>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">Vendor onboarding and management is a key aspect of supply chain management. Retailers and FMCG businesses partner with several vendors and distributors to ensure smooth operations, but quick and secure vendor verification is always a challenge.<\/span><\/p>\n<div class=\"flex-1 overflow-hidden @container\/thread\">\n<div class=\"h-full\">\n<div class=\"react-scroll-to-bottom--css-halqb-79elbk h-full\">\n<div class=\"react-scroll-to-bottom--css-halqb-1n7m0yu\">\n<div class=\"flex flex-col text-sm md:pb-9\">\n<article class=\"w-full scroll-mb-[var(--thread-trailing-height,150px)] text-token-text-primary focus-visible:outline-2 focus-visible:outline-offset-[-4px]\" dir=\"auto\" data-testid=\"conversation-turn-3\" data-scroll-anchor=\"true\">\n<div class=\"m-auto text-base py-[18px] px-3 md:px-4 w-full md:px-5 lg:px-4 xl:px-5\">\n<div class=\"mx-auto flex flex-1 gap-4 text-base md:gap-5 lg:gap-6 md:max-w-3xl\">\n<div class=\"group\/conversation-turn relative flex w-full min-w-0 flex-col agent-turn\">\n<div class=\"flex-col gap-1 md:gap-3\">\n<div class=\"flex max-w-full flex-col flex-grow\">\n<div class=\"min-h-8 text-message flex w-full flex-col items-end gap-2 whitespace-normal break-words text-start [.text-message+&amp;]:mt-5\" dir=\"auto\" data-message-author-role=\"assistant\" data-message-id=\"e3213022-679a-40aa-970a-a4438bf4a63a\" data-message-model-slug=\"gpt-4o-mini\">\n<div class=\"flex w-full flex-col gap-1 empty:hidden first:pt-[3px]\">\n<div class=\"markdown prose w-full break-words dark:prose-invert light\">\n<p>KYC systems with eKYC enable businesses to quickly onboard vendors and integrate eSign and eStamp for distributor agreements.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/article>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"flex-1 overflow-hidden @container\/thread\">\n<div class=\"h-full\">\n<div class=\"react-scroll-to-bottom--css-halqb-79elbk h-full\">\n<div class=\"react-scroll-to-bottom--css-halqb-1n7m0yu\">\n<div class=\"flex flex-col text-sm md:pb-9\">\n<article class=\"w-full scroll-mb-[var(--thread-trailing-height,150px)] text-token-text-primary focus-visible:outline-2 focus-visible:outline-offset-[-4px]\" dir=\"auto\" data-testid=\"conversation-turn-5\" data-scroll-anchor=\"true\">\n<div class=\"m-auto text-base py-[18px] px-3 md:px-4 w-full md:px-5 lg:px-4 xl:px-5\">\n<div class=\"mx-auto flex flex-1 gap-4 text-base md:gap-5 lg:gap-6 md:max-w-3xl\">\n<div class=\"group\/conversation-turn relative flex w-full min-w-0 flex-col agent-turn\">\n<div class=\"flex-col gap-1 md:gap-3\">\n<div class=\"flex max-w-full flex-col flex-grow\">\n<div class=\"min-h-8 text-message flex w-full flex-col items-end gap-2 whitespace-normal break-words text-start [.text-message+&amp;]:mt-5\" dir=\"auto\" data-message-author-role=\"assistant\" data-message-id=\"3ca535dc-ca07-4c54-ab4e-856f42a681c1\" data-message-model-slug=\"gpt-4o-mini\">\n<div class=\"flex w-full flex-col gap-1 empty:hidden first:pt-[3px]\">\n<div class=\"markdown prose w-full break-words dark:prose-invert light\">\n<p>KYC APIs integrate easily with supply chain systems, streamlining vendor and supply chain management for retailers.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/article>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<h4><span style=\"text-align: justify; font-size: 19px; font-family: 'open sans'; color: #333333;\"><b>Crypto<\/b><\/span><\/h4>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">Crypto has positioned itself as the frontier of digital finance, but the potential for misuse cannot be ignored. Due to the decentralized and effectively anonymous nature of transactions using virtual assets, crypto is partly a breeding ground for money laundering and financial crime.<\/span><\/p>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">KYC verification, therefore, has a massive role to play for virtual asset providers, crypto stock exchanges, and anyone trading or employing virtual assets and currencies. Strong KYC procedures, specifically designed for <a href=\"https:\/\/melento.ai\/en-in\/blog\/the-role-of-kyc-verification-in-aml-for-crypto-assets\">AML crypto<\/a> compliance, enable crypto users to be identified and risk factors to be analyzed. <\/span><\/p>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">ML fraud filters and remote KYC verification can be easily integrated into the virtual asset registration process and could potentially clean up the crypto sector.\u00a0<span style=\"color: #800080;\"><strong><a style=\"color: #800080;\" href=\"https:\/\/melento.ai\/en-in\/blog\/the-role-of-kyc-verification-in-aml-for-crypto-assets\">Read more<\/a>.<\/strong><\/span><\/span><\/p>\n<h4><span style=\"text-align: justify; font-size: 19px; font-family: 'open sans'; color: #333333;\"><b>Online Gaming &amp; Gambling\u00a0<\/b><\/span><\/h4>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">With the market for illegal gambling in India valued at more than USD 1 billion, KYC verification is hugely important for the online gaming and gambling industry.<\/span><\/p>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">Risks of money laundering, spoofing attacks from fraudsters, and the conditional legality of the gambling sector all serve to buttress the importance of KYC verification.<\/span><\/p>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">KYC checks lower risks of money laundering by identifying users, preventing risks of attacks by maintaining a secure database of customer information, and even streamlining the onboarding process for online gaming which is admittedly too long and convoluted.<\/span><\/p>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">KYC verification helps players in the online gambling industry retain customers by shortening the KYC process and automates the extensive due diligence process required from the gambling industry.\u00a0<span style=\"color: #800080;\"><strong><a style=\"color: #800080;\" href=\"https:\/\/melento.ai\/en-in\/blog\/kyc-verification-for-online-betting-gambling-gaming\">Read more<\/a>.<\/strong><\/span><\/span><\/p>\n<h4><span style=\"text-align: justify; font-size: 19px; font-family: 'open sans'; color: #333333;\"><b>Healthcare &amp; Pharmaceuticals\u00a0<\/b><\/span><\/h4>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">Strong KYC verification is a must for healthcare and pharmaceutical companies. These businesses manage several hundred business relationships including coordinating with vendors and suppliers, contracting distributors, hiring independent contractors and auditors, and managing a plethora of scientists, health professionals, lab workers, and more.<\/span><\/p>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">Due to the strong due diligence requirements inherent to the healthcare and pharma sectors, KYC verification is indispensable for smooth functioning. KYC verification APIs allow businesses to streamline these complex onboarding processes and maintain high visibility for onboarding status and the collected KYC data.<\/span><\/p>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">Aadhaar eKYC with integrated eSign and eStamp solutions helps companies draft, negotiate, and execute onboarding documents remotely. Following this, parties are onboarded instantly with a strong audit trail for compliance.\u00a0<span style=\"color: #800080;\"><strong><a style=\"color: #800080;\" href=\"https:\/\/melento.ai\/en-in\/blog\/how-doctors-can-spend-less-time-on-paperwork-treat-more-patients\">Read more<\/a>.<\/strong><\/span><\/span><\/p>\n<h3><span style=\"text-align: justify; font-size: 24px; font-family: 'open sans'; color: #2c5363;\"><b>Melento (Formerly SignDesk) &#8211; AI Powered KYC Verification\u00a0<\/b><\/span><\/h3>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">Melento (Formerly SignDesk) offers an award-winning and AI-powered KYC verification solution built for efficiency and easy compliance. Our KYC solution enables seamless and instant client verification using <a style=\"color: #333333;\" href=\"https:\/\/melento.ai\/en-in\/blog\/ocr-based-insurance-claims-verification\">OCR verification<\/a> technology for image data extraction, AI algorithms for real-time document verification, and customizable onboarding workflows.<\/span><\/p>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">Businesses can use our KYC verification APIs for Aadhaar eKYC, biometric KYC, <a style=\"color: #333333;\" href=\"https:\/\/melento.ai\/en-in\/blog\/irdai-officially-announces-vbip\">VBIP<\/a> or Video-based KYC verification. With 400+ clients and over 20 million annual transactions, Melento (Formerly SignDesk)\u2019s KYC verification solution is a trusted and proven platform for businesses across industries to digitally onboard clients and maintain compliance with AML procedures.<\/span><\/p>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">Learn more about how our KYC verification solution,\u00a0including the <a style=\"color: #333300;\" href=\"https:\/\/melento.ai\/en-in\/blog\/why-you-should-be-onboarding-customers-with-video-kyc\">benefits of Video KYC<\/a> can help you experience total automation by booking a demo with our product experts.<\/span><\/p>\n<div align=\"center\"><span style=\"color: #333333;\"><a style=\"color: #333333;\" href=\"https:\/\/melento.ai\/en-in\/talk-to-sales\"><button class=\"wpcf7-form-control wpcf7-submit envor-btn envor-btn-primary envor-btn-normal\" type=\"button\"><strong>Book a Demo <\/strong><\/button><\/a><\/span><\/div>\n<div id=\"download-ebook\" style=\"bottom: 0; width: 100%; position: fixed; z-index: 999; background-color: #7ee6cc; padding: 5px 10px; margin-left: -8%; font-family: 'Montserrat', sans-serif !important;\">\n<div style=\"display: flex; justify-content: center; align-items: center;\">\n<h5 style=\"margin: 0px !important; font-weight: 500 !important; color: #2c5363;\">Download Latest Ebook For Free!<\/h5>\n<p><a href=\"https:\/\/melento.ai\/en-in\/ebooks\/kyc\/business-guide-to-video-kyc-verification\/\"><button style=\"border-radius: 5px !important; margin-left: 15px; padding: 2px 13px; font-weight: 800; color: white; background-color: #2c5363;\">Click Here<\/button><\/a><\/p>\n<\/div>\n<\/div>\n<style>\n#download-ebook h5 {font-size: 22px !important;}#download-ebook p{margin-bottom:0px !important;}@media(max-width:767px) {#download-ebook {margin-left: -12% !important;}#download-ebook h5 {font-size: 15px !important;}#download-ebook button {padding: 8px 13px !important;}}<\/style>\n","protected":false},"excerpt":{"rendered":"<p>Know Your Customer or KYC is a set of protocols designed to verify the identity of a client or entity before conducting business with them. The KYC process typically involves collecting certain information from a prospective client, verifying this information to ensure veracity, and then using this information to estimate the potential business risk of [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":9326,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page_templates\/blog-new-3.php","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[14,22],"tags":[92,151,311,496,587,824,1431,1457,1476,1479,1480,1639,1686,1736,1924,2255,2373,2386,2399],"class_list":["post-7235","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ekyc","category-video-kyc","tag-aadhaar-xml-verification","tag-aml","tag-ckyc","tag-customer-due-diligence-cdd","tag-digital-onboarding","tag-ekyc","tag-key-components-of-kyc-verification","tag-kyc-checks","tag-kyc-use-cases","tag-kyc-verification","tag-kyc-verification-api","tag-need-of-kyc-verification","tag-offline-ekyc","tag-online-ekyc","tag-purpose-of-kyc-verification","tag-types-of-kyc-verification","tag-video-kyc","tag-video-kyc-verification","tag-video-based-kyc-verification"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.1.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>KYC Verification - Everything You Need To Know<\/title>\n<meta name=\"description\" content=\"KYC verification is a crucial process for businesses, involving the collection &amp; verification of KYC data. KYC reduces fraud &amp; ensures AML\/TF compliance.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/melento.ai\/en-in\/blog\/all-about-kyc-verification\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"KYC Verification - Everything You Need To Know\" \/>\n<meta property=\"og:description\" content=\"KYC verification is a crucial process for businesses, involving the collection &amp; verification of KYC data. KYC reduces fraud &amp; ensures AML\/TF compliance.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/melento.ai\/en-in\/blog\/all-about-kyc-verification\" \/>\n<meta property=\"og:site_name\" content=\"Melento (Formerly SignDesk)\" \/>\n<meta property=\"article:published_time\" content=\"2022-08-05T09:11:07+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-17T13:01:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/melento.ai\/en-in\/blog\/wp-content\/uploads\/2016\/09\/ARTICLE-IMAGE_24_11-02-2-1-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"642\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Abhijith NS\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Abhijith NS\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"17 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/melento.ai\/en-in\/blog\/all-about-kyc-verification\",\"url\":\"https:\/\/melento.ai\/en-in\/blog\/all-about-kyc-verification\",\"name\":\"KYC Verification - Everything You Need To Know\",\"isPartOf\":{\"@id\":\"https:\/\/melento.ai\/en-in\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/melento.ai\/en-in\/blog\/all-about-kyc-verification#primaryimage\"},\"image\":{\"@id\":\"https:\/\/melento.ai\/en-in\/blog\/all-about-kyc-verification#primaryimage\"},\"thumbnailUrl\":\"https:\/\/melento.ai\/en-in\/blog\/wp-content\/uploads\/2016\/09\/ARTICLE-IMAGE_24_11-02-2-1-1.jpg\",\"datePublished\":\"2022-08-05T09:11:07+00:00\",\"dateModified\":\"2025-09-17T13:01:13+00:00\",\"author\":{\"@id\":\"https:\/\/melento.ai\/en-in\/blog\/#\/schema\/person\/ec422007f10d83f117454e7779dc4d23\"},\"description\":\"KYC verification is a crucial process for businesses, involving the collection & verification of KYC data. KYC reduces fraud & ensures AML\/TF compliance.\",\"breadcrumb\":{\"@id\":\"https:\/\/melento.ai\/en-in\/blog\/all-about-kyc-verification#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/melento.ai\/en-in\/blog\/all-about-kyc-verification\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/melento.ai\/en-in\/blog\/all-about-kyc-verification#primaryimage\",\"url\":\"https:\/\/melento.ai\/en-in\/blog\/wp-content\/uploads\/2016\/09\/ARTICLE-IMAGE_24_11-02-2-1-1.jpg\",\"contentUrl\":\"https:\/\/melento.ai\/en-in\/blog\/wp-content\/uploads\/2016\/09\/ARTICLE-IMAGE_24_11-02-2-1-1.jpg\",\"width\":1200,\"height\":642,\"caption\":\"guide-on-kyc-verification\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/melento.ai\/en-in\/blog\/all-about-kyc-verification#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/melento.ai\/en-in\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"KYC Verification\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/melento.ai\/en-in\/blog\/#website\",\"url\":\"https:\/\/melento.ai\/en-in\/blog\/\",\"name\":\"Melento\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/melento.ai\/en-in\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/melento.ai\/en-in\/blog\/#\/schema\/person\/ec422007f10d83f117454e7779dc4d23\",\"name\":\"Abhijith NS\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/melento.ai\/en-in\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/eae9ee21b4305af36d9e50b14e1f8a195d238df959bb0003ea7d069b856acbd4?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/eae9ee21b4305af36d9e50b14e1f8a195d238df959bb0003ea7d069b856acbd4?s=96&d=mm&r=g\",\"caption\":\"Abhijith NS\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"KYC Verification - Everything You Need To Know","description":"KYC verification is a crucial process for businesses, involving the collection & verification of KYC data. KYC reduces fraud & ensures AML\/TF compliance.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/melento.ai\/en-in\/blog\/all-about-kyc-verification","og_locale":"en_US","og_type":"article","og_title":"KYC Verification - Everything You Need To Know","og_description":"KYC verification is a crucial process for businesses, involving the collection & verification of KYC data. KYC reduces fraud & ensures AML\/TF compliance.","og_url":"https:\/\/melento.ai\/en-in\/blog\/all-about-kyc-verification","og_site_name":"Melento (Formerly SignDesk)","article_published_time":"2022-08-05T09:11:07+00:00","article_modified_time":"2025-09-17T13:01:13+00:00","og_image":[{"width":1200,"height":642,"url":"https:\/\/melento.ai\/en-in\/blog\/wp-content\/uploads\/2016\/09\/ARTICLE-IMAGE_24_11-02-2-1-1.jpg","type":"image\/jpeg"}],"author":"Abhijith NS","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Abhijith NS","Est. reading time":"17 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/melento.ai\/en-in\/blog\/all-about-kyc-verification","url":"https:\/\/melento.ai\/en-in\/blog\/all-about-kyc-verification","name":"KYC Verification - Everything You Need To Know","isPartOf":{"@id":"https:\/\/melento.ai\/en-in\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/melento.ai\/en-in\/blog\/all-about-kyc-verification#primaryimage"},"image":{"@id":"https:\/\/melento.ai\/en-in\/blog\/all-about-kyc-verification#primaryimage"},"thumbnailUrl":"https:\/\/melento.ai\/en-in\/blog\/wp-content\/uploads\/2016\/09\/ARTICLE-IMAGE_24_11-02-2-1-1.jpg","datePublished":"2022-08-05T09:11:07+00:00","dateModified":"2025-09-17T13:01:13+00:00","author":{"@id":"https:\/\/melento.ai\/en-in\/blog\/#\/schema\/person\/ec422007f10d83f117454e7779dc4d23"},"description":"KYC verification is a crucial process for businesses, involving the collection & verification of KYC data. KYC reduces fraud & ensures AML\/TF compliance.","breadcrumb":{"@id":"https:\/\/melento.ai\/en-in\/blog\/all-about-kyc-verification#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/melento.ai\/en-in\/blog\/all-about-kyc-verification"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/melento.ai\/en-in\/blog\/all-about-kyc-verification#primaryimage","url":"https:\/\/melento.ai\/en-in\/blog\/wp-content\/uploads\/2016\/09\/ARTICLE-IMAGE_24_11-02-2-1-1.jpg","contentUrl":"https:\/\/melento.ai\/en-in\/blog\/wp-content\/uploads\/2016\/09\/ARTICLE-IMAGE_24_11-02-2-1-1.jpg","width":1200,"height":642,"caption":"guide-on-kyc-verification"},{"@type":"BreadcrumbList","@id":"https:\/\/melento.ai\/en-in\/blog\/all-about-kyc-verification#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/melento.ai\/en-in\/blog\/"},{"@type":"ListItem","position":2,"name":"KYC Verification"}]},{"@type":"WebSite","@id":"https:\/\/melento.ai\/en-in\/blog\/#website","url":"https:\/\/melento.ai\/en-in\/blog\/","name":"Melento","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/melento.ai\/en-in\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/melento.ai\/en-in\/blog\/#\/schema\/person\/ec422007f10d83f117454e7779dc4d23","name":"Abhijith NS","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/melento.ai\/en-in\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/eae9ee21b4305af36d9e50b14e1f8a195d238df959bb0003ea7d069b856acbd4?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/eae9ee21b4305af36d9e50b14e1f8a195d238df959bb0003ea7d069b856acbd4?s=96&d=mm&r=g","caption":"Abhijith NS"}}]}},"_links":{"self":[{"href":"https:\/\/melento.ai\/en-in\/blog\/wp-json\/wp\/v2\/posts\/7235","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/melento.ai\/en-in\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/melento.ai\/en-in\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/melento.ai\/en-in\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/melento.ai\/en-in\/blog\/wp-json\/wp\/v2\/comments?post=7235"}],"version-history":[{"count":0,"href":"https:\/\/melento.ai\/en-in\/blog\/wp-json\/wp\/v2\/posts\/7235\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/melento.ai\/en-in\/blog\/wp-json\/wp\/v2\/media\/9326"}],"wp:attachment":[{"href":"https:\/\/melento.ai\/en-in\/blog\/wp-json\/wp\/v2\/media?parent=7235"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/melento.ai\/en-in\/blog\/wp-json\/wp\/v2\/categories?post=7235"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/melento.ai\/en-in\/blog\/wp-json\/wp\/v2\/tags?post=7235"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}