SlideShare a Scribd company logo
1 of 31
Download to read offline
1
1iSignthis © 2015
iSignthis Ltd (ASX : ISX )
Transactions Drive e-Identity:
Payments and AML/CTF KYC
MODERATOR:
Hue Dang, CAMS
Head of Asia, ACAMS
Jointly Presented by:
Managing Director
John Karantzis B.E., LL.M, M.Ent, FIEAust
Director
Scott W Minehane B.Econ LL.B., LL.M
2
What drives the need for e- Identity?
Transactions!
People are identified when they want to do something……..
Buy, sell, trade, receive goods and services.
The internet means we need to adapt to how we approach identity.
Regulated (online) transactions are subject to:
•  Financial Identity (KYC)
•  Privacy / Data Protection law
•  Doing things well reduces compliance costs and enhances the customer experience
3
Today’s Presentation
1.  Identity? What is it?
2.  Regulatory Approaches to Identity
i.  European Union
ii.  South Korea
iii.  Hong Kong
iv.  Singapore
v.  Australia
3.  Private Sector – Who needs identity?
4.  How do we establish identity?
a.  Physical Documents
b.  Static Electronic Verification
c.  Dynamic Electronic Verification
5.  Conclusions
4
1. What is Identity
A lawful or legally standing association, corporation,
partnership, proprietorship, trust, or individual.
Has legal capacity to:
•  enter into agreements or contracts,
•  assume obligations,
•  incur and pay debts,
•  sue and be sued in its own right, and
•  to be accountable for illegal activities.
5
1a. What is Digital Identity?
•  Lets look at how Privacy law treats identity:
•  In the US, the law provides multiple definitions of Personally Identifiable
Information (PII), most focusing on whether the information pertains to an
(already) identified person.
•  By way of contrast, in the EU, there is a single definition of personal data to
encompass all information identifiable to a person.
•  The E.U. Data Protection Directive defines “an identifiable” person as “one who
can be identified, directly, or indirectly, in particular by reference to an identification
number or to one or more factors specific to his physical, physiological, mental,
economic, cultural, or social identity.”
6
2. Regulatory approaches to identity
1.  “Specific Type Approach” : Regulations specifically state the
means or what must be done
2.  “Non Public Approach” : regulations seek to make use of
information that is not in the public domain to identify a person
3.  “Principles Based Approach” :State the outcome rather than the
means. The means may include elements of Specific Type and
Non Public, as well as other means.
4.  FATF ‘risk based approach’ favours move towards ‘Principles
based Approach’.
7
Guiding Principle for FATF legislative model jurisdictions
“Customer due diligence measures shall comprise:
Identifying the customer and verifying the customer's identity on
the basis of documents, data or information obtained from a
reliable and independent source;”
2a. FATF Recommendations #5
(Principles Based Approach)
8
Consider the following factors with regards to data
•  (a) its accuracy;
•  (b) how secure it is;
•  (c) how the data is kept up-to-date / its recency
•  (d) how comprehensive the data is
•  (e) whether the data is maintained by a government
body or pursuant to legislation; and
•  (f) whether the electronic data can be additionally
authenticated
2b. What is a reliable source of data?
9
2 (i). ’Identifying’ the customer (EU)
•  In the EU, any “unique” attribute is sufficient to identify a
person (Principle based)
•  However, EU all member states require verification of
name + address (UK, IRL, SE)
•  Some states require verification of age as well : name +
address + age (Eg FR, IT and BG).
10
South Korea’s Article 38 (of 2010 AMLCTF Regs)
takes a specific approach.
Identifying a customer is defined as :
•  name,
•  Address,
•  identity or travel document incl. number and type
If not a Korean Citizen, also require
•  date of birth
•  nationality,
2 (ii). ’Identifying’ the customer (KOR)
11
Article 35 (Non face-to-face transactions)
(1) Financial institutions shall establish policies and
procedures to address the risk of ML/TF related to
non-face-to-face transactions.
2 (ii). Remote ’Verifying’ the customer (KOR)
12
2 (ii). ’Identifying’ the customer (HKG)
Hong Kong takes a specific approach via the Guidance Note
GN33 (March 2015), similar to South Korea’s Article 38
Identifying a customer is defined as :
•  name,
•  Address,
•  date of birth
•  nationality
•  identity or travel document incl. number and type
13
FI must carry out at least one of the following measures for
remote on-boarding:
a.  Use additional sources of documents, data or information
b.  taking supplementary measures to verify all the information
provided by the customer;
c.  ensuring that the first payment made into the customer’s
account is received from an account in the customer’s name
with an authorized institution in an equivalent jurisdiction……
2 (iii). Remote ‘Verifying’ the customer (HKG)
14
2 (iv). Remote ‘Verifying’ the customer (SGP)
MAS 626 (New Guidelines 24 April 2015) –Appropriate measures to
address risks arising from undertaking transactions via internet, by
using one or more of:
(a) Independent telephone verification of customer;
(b) confirmation of the customer’s address;
(c) confirmation of the customer’s employment status;
(d) customer’s salary confirmation by use of recent bank
statements from another bank;
(e) qualified 3rd party certification of identification documents
(f) requiring the first payment to be carried out through an account in
the customer’s name with another FI subject to similar or equivalent
customer due diligence standards;
15
The reporting entity must collect and verify the following
KYC information:
i.  the customer’s full name; and
Collect both of, but verify either /any one of :
a.  the customer’s date of birth, or
b.  the customer’s residential address.
2 (iv). ’Identifying’ and ‘Verifying’ the customer (AUS)
16
0
1
2
3
4
5
6
7
AUS/UK/US/SE IT/FR/BG KOR HKG SGP
Name + Address
Or Name + DoB
Name + Address+ DoB Name + Address+ DoB + Nationality +
GovID + [SGP] Contact Details
2(v). Summary : # of Attributes to be Verified.
17
3. Private Sector: Who needs Identity?
•  Payment processors : compliance
requirement for AML KYC & /or
ECB SecuRE Pay.
•  eMerchants in the SEPA/EU28 as
part of the ECB’s Strong Customer
Authentication.
•  Stock Brokers
•  Financial Systems requiring two
factor authentication technology
•  Banks (incl debit, card issuers)
•  Commodity/Bullion Brokers
•  Crypto Currency Exchanges (e.g.
bitcoin)
•  Real Estate Sales/Rental Agents
•  Travel Agents (US Patriot Act)
•  Life Insurers
•  Accountants/Auditors/Lawyers
•  Financial Advisors/Super Funds
•  eWallets/mWallet Providers
•  Money remittance p2p
•  Loan/Pawn Providers
•  eCasino/eGaming/eWagering
•  Any business routinely trading >
US $10k/transaction
•  Currency Exchange
Payment
Processing
Financial
Professional
Services
Others
18
Customer
Ease
Lower
Cost
LOCAL
AUTOMATED
MANUAL
Notarised:
posted/uploaded documents*
‘Experian’ or ‘GBGroup’ style static,
credit database search (UK, US, AU)
Face to face checks
iSignthis + PayPal
GLOBAL
•  No dynamic means to include customer
on request if not already a historic
customer of a credit reporting agency.
•  Requires cross check of other databases.
•  Typical coverage of 60% of online applicants
•  >3Bn accessible global
payment instruments.
•  No need for user’s disclosure of bank
details to a third party.
Lower
Friction
Remote
on boarding
3. Private Sector: Who needs Identity?
19
Two ways:
(i) Face to Face– from reliable document sources, normally using
government issued photo identity documents.
Typically, we look for;
•  Proof of Identity (POI) – birth certificate, marriage certificate
•  Evidence of Identity (EOI) – government issued ID or bank accounts/cards
•  Social Footprint – utility bills, payments, insurances
(ii) Electronic Verification (EV) – from reliable data or information sources
4. How do we establish identity?
20
The EU’s Public Register of Authentic
Identity and Travel Documents Online
(PRADO), recommends:
“When checking security features of documents:
FEEL, LOOK, TILT!”
And
“Check the validity of document numbers – [via]
List of links to websites with information on invalid
document numbers”
http://prado.consilium.europa.eu
4a (i). Approach 1 – Physical Documents
(Challenges – Authenticity, Validity, Transformation, Verification)
en.wikipedia.org/wiki/European_driving_licence
21
4a (i). Transforming – Physical Documents
(Challenges – Authenticity, Validity, Transformation, Verification)
•  Trend in some countries towards using Webcams or non-Certified
images.
•  Scanners/Webcams – can’t look, feel tilt ; so, how valid, “reliable”
or “independent is uploading of an identity document(s)?
•  How reliable is a comparison of a photo on such a document via
webcam?
•  There is no EU or global register of stolen credentials…how is
validity of these documents checked?
•  Can a document be transitioned from physical to become “data”
or information without verification as to its reliability or validity by
issuer?
22
Is there a legal basis to rely upon non issuer/third party
transformed physical documents?
•  NO! This approach is specifically prohibited or not endorsed by regulators
in many jurisdictions:
•  Eg, Germany (legislation), HKG (GN33 @ 4.12.2), Singapore (MAS
Guidance Note @ 33), Australia (AML Regs), Korea (Original or certified,
Per AMLCTF Reg 39), UK (AML2007, 14(2)(c)), Canada (Schedule 7)
•  We could not find direct support in any EU, Australian or Asia AML/CTF
regulation that supports the concept of digital transformation of
documents to data as constituting a reliable source of data – unless a
qualified person certifies the document
4a (ii). Transforming – Physical Documents
23
Breach Size
80m , Jan 15
Breach Size
1m , Nov 14
Static database – electoral, credit, passport, drivers license
Relies on “Non Public Approach” Knowledge Based Authentication
(KBA) – comparison of collected data to database.
Issues
•  Highly localised, no global approach
•  Much of the data is public or easily obtained.
•  No revocation means if say wallet stolen or mailbox compromised
•  Data may not change between KBA making ongoing due diligence
risible susceptible to ghosting and/or takeover
•  Simple to ‘reverse or social engineer’ the KBA
•  Once breached, re-credentialing of individuals is difficult – data
becomes “public” – what now?
4a (ii). Approach 2: Static Database Electronic Verification
(Non Public Approach)
24
Physical
Identification
Proof of Identity
Documents
E- Payment
Account
Accounts
Unique
Regulated AML
(Identifies
Person)
Verify Account
Once verified -
“Reliable” Source
for EV (AML)
KYC Identity
Sanction Screen
+ Monitor
Validate data
Secondary
Sources of Data
150m people
200 countries
4C. Approach 3: Dynamic Re-Use of Bank ID
(Principles based)
25
25
Direct Account Access
1.  Request account login details from
customer
2.  Service Provider Accesses account
3.  SP Confirms account is active and retrieve
details associated with account
Key Risk : requires customer to provide Sensitive
Account Data (login details + Password)
Key Limitation : limited to 350m bank accounts,
mainly in SEPA. No credit card support.
Global – legal, risk, liability issues?
Indirect Account Access via KBA
1.  Service Provider creates a “secret” using
payment against payment instrument and
Process secret to a statement of account
2.  Ask customer to retrieve secret from payment
instrument “secure area”
Key advantages :
i)  Customer Sensitive Account Data not exposed
to 3rd party
ii)  Global : Leverages more than 3.5Bn cards and
bank accounts across 200 countries
iii)  Risks reduced for all parties incl operator
liability under eIDAS for data breach
4C (i). Approach 3: Dynamic Electronic Verification
26
26
4C (ii). KBA Example: iSignthis & PayPal
27
Payment Data (Merchant, Acquirer, Card
Details, Name, Amount, Time, Place, IIN
Data + Country of issue)
Authentication + Validation Data
(Geodata, device data, SAD, phone
number, SMS)
Device Data
(MAC, IMEI, CPE, Language, OS)
Network Data : IP
Address, Carrier,
Channel, route, Cell
Tower
Delivery Data
Address, Phone
Under EU law, all of this is PII – identifiable to a person
Under US law, taken as a whole, this is also PII – identifies a person.
4C (iii). Advantages of Transactional Approach:
Metadata is the DNA of a payment message
28
Link Identity & Payment Account with 2FA
First Factor: User selected Passcode
Second Factor: One Time Password by SMS
Or Assurity(.sg) hard token
iSignthis Identity :
AML/CTF KYC Identity
traced & linked to 2FA
and/or Identity file created
Customer transacts
with eMerchant
Online or mobile
Customer
iSignthis process takes
place post cart checkout,
ensuring high conversion
rates.
4c (iv). A reliable means to generate identity on demand
29
Passporting:
•  Country <> Country
•  AML Service <> AML Service
•  AML Service <>Government
Possible in most jurisdictions provided that source is from an
equivalency jurisdiction – not necessarily FATF.
5. Global application- Passporting
30
•  Transactions drive e-identity. And ought do so – ‘pre-
boarding’ is an outmoded concept for online, and On-
boarding customers for the sake of doing so is expensive
and unnecessary.
•  Identity is complex. Legally establishing identity is even
more complex.
•  Ultimately given its importance to ecommerce a scalable,
dynamic electronic verification approach to identity is
important taking into account security, costs and the user
experience
•  Global opportunities via passporting approach.
•  Documents are not data unless transformed by a qualified
certifying party.
Key Takeaways
31
Sales:
Andrew Karantzis
andrew.karantzis@isignthis.com
+61 411 428 259
For further information contact:

More Related Content

What's hot

KYC Know Your Customer
KYC Know Your CustomerKYC Know Your Customer
KYC Know Your CustomerTaha Khan
 
Prevention of money laundering class room notes for ca icma
Prevention of money laundering class room notes for ca icma Prevention of money laundering class room notes for ca icma
Prevention of money laundering class room notes for ca icma pavan kumar
 
Anti-money laundering presentation
Anti-money laundering presentationAnti-money laundering presentation
Anti-money laundering presentationElias Mose
 
Money Laundering and Its Fall-out - ROLE OF BANKS & FINANCIAL INSTITUTIONS I...
Money Laundering  and Its Fall-out - ROLE OF BANKS & FINANCIAL INSTITUTIONS I...Money Laundering  and Its Fall-out - ROLE OF BANKS & FINANCIAL INSTITUTIONS I...
Money Laundering and Its Fall-out - ROLE OF BANKS & FINANCIAL INSTITUTIONS I...Resurgent India
 
Anti money laundering
Anti money launderingAnti money laundering
Anti money launderingUttma Shukla
 
KYC AML regulation in EU
KYC AML regulation in EUKYC AML regulation in EU
KYC AML regulation in EUMuthu Siva
 
Anti Money Laundering
Anti Money LaunderingAnti Money Laundering
Anti Money LaunderingTaha Khan
 
Presentation AML
Presentation AMLPresentation AML
Presentation AMLMirsazzad
 
Virtual Currency Compliance: Anti-Money Laundering
Virtual Currency Compliance: Anti-Money LaunderingVirtual Currency Compliance: Anti-Money Laundering
Virtual Currency Compliance: Anti-Money LaunderingJay Postma
 
Anti money laundering - PEPs
Anti money laundering - PEPsAnti money laundering - PEPs
Anti money laundering - PEPsBesart Qerimi
 
Basics of Anti-Money Laundering : A Really Quick Primer
Basics of Anti-Money Laundering : A Really Quick PrimerBasics of Anti-Money Laundering : A Really Quick Primer
Basics of Anti-Money Laundering : A Really Quick Primercomplianceonline123
 
ANTI MONEY LAUNDERING REGULATIONS, UAE
ANTI MONEY LAUNDERING REGULATIONS, UAEANTI MONEY LAUNDERING REGULATIONS, UAE
ANTI MONEY LAUNDERING REGULATIONS, UAEJino M Kurian
 
How to Improve Anti-Money Laundering Investigation using Neo4j
How to Improve Anti-Money Laundering Investigation using Neo4jHow to Improve Anti-Money Laundering Investigation using Neo4j
How to Improve Anti-Money Laundering Investigation using Neo4jNeo4j
 
E-book: How to manage Anti-Money Laundering and Counter Financing of Terroris...
E-book: How to manage Anti-Money Laundering and Counter Financing of Terroris...E-book: How to manage Anti-Money Laundering and Counter Financing of Terroris...
E-book: How to manage Anti-Money Laundering and Counter Financing of Terroris...Jitske de Bruijne
 
Risk Based Approach to Anti Money Laundering and Counter Terrorist Financing
Risk Based Approach to Anti Money Laundering and Counter Terrorist Financing Risk Based Approach to Anti Money Laundering and Counter Terrorist Financing
Risk Based Approach to Anti Money Laundering and Counter Terrorist Financing IIR Middle East
 

What's hot (20)

Aml&kyc 1
Aml&kyc 1Aml&kyc 1
Aml&kyc 1
 
KYC Know Your Customer
KYC Know Your CustomerKYC Know Your Customer
KYC Know Your Customer
 
Prevention of money laundering class room notes for ca icma
Prevention of money laundering class room notes for ca icma Prevention of money laundering class room notes for ca icma
Prevention of money laundering class room notes for ca icma
 
Anti-money laundering presentation
Anti-money laundering presentationAnti-money laundering presentation
Anti-money laundering presentation
 
Money Laundering and Its Fall-out - ROLE OF BANKS & FINANCIAL INSTITUTIONS I...
Money Laundering  and Its Fall-out - ROLE OF BANKS & FINANCIAL INSTITUTIONS I...Money Laundering  and Its Fall-out - ROLE OF BANKS & FINANCIAL INSTITUTIONS I...
Money Laundering and Its Fall-out - ROLE OF BANKS & FINANCIAL INSTITUTIONS I...
 
Anti money laundering
Anti money launderingAnti money laundering
Anti money laundering
 
KYC AML regulation in EU
KYC AML regulation in EUKYC AML regulation in EU
KYC AML regulation in EU
 
Anti Money Laundering
Anti Money LaunderingAnti Money Laundering
Anti Money Laundering
 
Presentation AML
Presentation AMLPresentation AML
Presentation AML
 
Virtual Currency Compliance: Anti-Money Laundering
Virtual Currency Compliance: Anti-Money LaunderingVirtual Currency Compliance: Anti-Money Laundering
Virtual Currency Compliance: Anti-Money Laundering
 
Anti money laundering - PEPs
Anti money laundering - PEPsAnti money laundering - PEPs
Anti money laundering - PEPs
 
AML Training uba capital
AML Training uba capitalAML Training uba capital
AML Training uba capital
 
Basics of Anti-Money Laundering : A Really Quick Primer
Basics of Anti-Money Laundering : A Really Quick PrimerBasics of Anti-Money Laundering : A Really Quick Primer
Basics of Anti-Money Laundering : A Really Quick Primer
 
Aml & kyc
Aml & kyc Aml & kyc
Aml & kyc
 
ANTI MONEY LAUNDERING REGULATIONS, UAE
ANTI MONEY LAUNDERING REGULATIONS, UAEANTI MONEY LAUNDERING REGULATIONS, UAE
ANTI MONEY LAUNDERING REGULATIONS, UAE
 
How to Improve Anti-Money Laundering Investigation using Neo4j
How to Improve Anti-Money Laundering Investigation using Neo4jHow to Improve Anti-Money Laundering Investigation using Neo4j
How to Improve Anti-Money Laundering Investigation using Neo4j
 
KYC/AML 2016
KYC/AML 2016KYC/AML 2016
KYC/AML 2016
 
E-book: How to manage Anti-Money Laundering and Counter Financing of Terroris...
E-book: How to manage Anti-Money Laundering and Counter Financing of Terroris...E-book: How to manage Anti-Money Laundering and Counter Financing of Terroris...
E-book: How to manage Anti-Money Laundering and Counter Financing of Terroris...
 
Aml cft training programme
Aml cft training programmeAml cft training programme
Aml cft training programme
 
Risk Based Approach to Anti Money Laundering and Counter Terrorist Financing
Risk Based Approach to Anti Money Laundering and Counter Terrorist Financing Risk Based Approach to Anti Money Laundering and Counter Terrorist Financing
Risk Based Approach to Anti Money Laundering and Counter Terrorist Financing
 

Viewers also liked

StubbsGazette AML/CFT EBook for Credit Unions
StubbsGazette AML/CFT EBook for Credit UnionsStubbsGazette AML/CFT EBook for Credit Unions
StubbsGazette AML/CFT EBook for Credit UnionsStubbsGazette
 
Anti-Money Laundering and Countering the Financing of Terrorism - StubbsGazet...
Anti-Money Laundering and Countering the Financing of Terrorism - StubbsGazet...Anti-Money Laundering and Countering the Financing of Terrorism - StubbsGazet...
Anti-Money Laundering and Countering the Financing of Terrorism - StubbsGazet...StubbsGazette
 
4. op risk and aml
4. op risk and aml4. op risk and aml
4. op risk and amlcrmbasel
 
Financial crime anti-money laundering - bovill briefing
Financial crime   anti-money laundering - bovill briefingFinancial crime   anti-money laundering - bovill briefing
Financial crime anti-money laundering - bovill briefingBovill
 
Anti-Money Laundering (AML) Risk Assessment Process
Anti-Money Laundering (AML) Risk Assessment ProcessAnti-Money Laundering (AML) Risk Assessment Process
Anti-Money Laundering (AML) Risk Assessment Processaccenture
 
ICBC AML Risk-Based Approach (Jan 2011) by Bachir El Nakib
ICBC AML Risk-Based Approach (Jan 2011) by Bachir El NakibICBC AML Risk-Based Approach (Jan 2011) by Bachir El Nakib
ICBC AML Risk-Based Approach (Jan 2011) by Bachir El NakibBachir El-Nakib, CAMS
 
Combating monel laundering
Combating monel launderingCombating monel laundering
Combating monel launderinguelstudent123
 

Viewers also liked (10)

Aml basics
Aml basicsAml basics
Aml basics
 
StubbsGazette AML/CFT EBook for Credit Unions
StubbsGazette AML/CFT EBook for Credit UnionsStubbsGazette AML/CFT EBook for Credit Unions
StubbsGazette AML/CFT EBook for Credit Unions
 
Anti-Money Laundering and Countering the Financing of Terrorism - StubbsGazet...
Anti-Money Laundering and Countering the Financing of Terrorism - StubbsGazet...Anti-Money Laundering and Countering the Financing of Terrorism - StubbsGazet...
Anti-Money Laundering and Countering the Financing of Terrorism - StubbsGazet...
 
out (96)
out (96)out (96)
out (96)
 
4. op risk and aml
4. op risk and aml4. op risk and aml
4. op risk and aml
 
Financial crime anti-money laundering - bovill briefing
Financial crime   anti-money laundering - bovill briefingFinancial crime   anti-money laundering - bovill briefing
Financial crime anti-money laundering - bovill briefing
 
AML/CTF Compliance Presentation - Gaming
AML/CTF Compliance Presentation - GamingAML/CTF Compliance Presentation - Gaming
AML/CTF Compliance Presentation - Gaming
 
Anti-Money Laundering (AML) Risk Assessment Process
Anti-Money Laundering (AML) Risk Assessment ProcessAnti-Money Laundering (AML) Risk Assessment Process
Anti-Money Laundering (AML) Risk Assessment Process
 
ICBC AML Risk-Based Approach (Jan 2011) by Bachir El Nakib
ICBC AML Risk-Based Approach (Jan 2011) by Bachir El NakibICBC AML Risk-Based Approach (Jan 2011) by Bachir El Nakib
ICBC AML Risk-Based Approach (Jan 2011) by Bachir El Nakib
 
Combating monel laundering
Combating monel launderingCombating monel laundering
Combating monel laundering
 

Similar to Payments and AML CFT KYC

Btcs corporate presentation october 2014 final
Btcs corporate presentation october 2014   finalBtcs corporate presentation october 2014   final
Btcs corporate presentation october 2014 finalRedChip Companies, Inc.
 
Btcs corporate presentation october 2014 final
Btcs corporate presentation october 2014   finalBtcs corporate presentation october 2014   final
Btcs corporate presentation october 2014 finalRedChip Companies, Inc.
 
ICOs, Cryptocurrency, and Tokenization: Legal Issues
ICOs, Cryptocurrency, and Tokenization: Legal Issues ICOs, Cryptocurrency, and Tokenization: Legal Issues
ICOs, Cryptocurrency, and Tokenization: Legal Issues Roger Royse
 
B12: AMLO | FinTech Situation in Thailand and Offshore and Money Laundering R...
B12: AMLO | FinTech Situation in Thailand and Offshore and Money Laundering R...B12: AMLO | FinTech Situation in Thailand and Offshore and Money Laundering R...
B12: AMLO | FinTech Situation in Thailand and Offshore and Money Laundering R...Kullarat Phongsathaporn
 
DLT - AML & CFT - Risks & Opportunites
DLT - AML & CFT - Risks & Opportunites DLT - AML & CFT - Risks & Opportunites
DLT - AML & CFT - Risks & Opportunites Philip Vasquez
 
Bitcoin, Block Chain, Cryptocurrency and ICOs: A Legal Perspective
Bitcoin, Block Chain, Cryptocurrency and ICOs: A Legal PerspectiveBitcoin, Block Chain, Cryptocurrency and ICOs: A Legal Perspective
Bitcoin, Block Chain, Cryptocurrency and ICOs: A Legal Perspectiveideatoipo
 
B11: Central IP & IT Court | FinTech: Legal and Regulatory Challenges (7 Aug ...
B11: Central IP & IT Court | FinTech: Legal and Regulatory Challenges (7 Aug ...B11: Central IP & IT Court | FinTech: Legal and Regulatory Challenges (7 Aug ...
B11: Central IP & IT Court | FinTech: Legal and Regulatory Challenges (7 Aug ...Kullarat Phongsathaporn
 
CASE STUDY ON PKI & BIOMETRIC BASED APPLICATION
CASE STUDY ON PKI & BIOMETRIC BASED APPLICATIONCASE STUDY ON PKI & BIOMETRIC BASED APPLICATION
CASE STUDY ON PKI & BIOMETRIC BASED APPLICATIONPankaj Rane
 
A Comprehensive Guide of KYC in Crypto Exchanges in 2023.pdf
A Comprehensive Guide of KYC in Crypto Exchanges in 2023.pdfA Comprehensive Guide of KYC in Crypto Exchanges in 2023.pdf
A Comprehensive Guide of KYC in Crypto Exchanges in 2023.pdfIDMERIT IDMERIT
 
Banker and Customer Relation
Banker and Customer RelationBanker and Customer Relation
Banker and Customer RelationSowmyashreeBhat1
 
Simplification and Ease of User Data Verification: The Regulatory Framework f...
Simplification and Ease of User Data Verification: The Regulatory Framework f...Simplification and Ease of User Data Verification: The Regulatory Framework f...
Simplification and Ease of User Data Verification: The Regulatory Framework f...AHRP Law Firm
 
SSI, TBDex Overview
SSI, TBDex Overview SSI, TBDex Overview
SSI, TBDex Overview AlexLewin7
 
Indjic fintech module 3
Indjic fintech module 3Indjic fintech module 3
Indjic fintech module 3Drago Indjic
 
Jan Keil - Identity and access management Facts. Challenges. Solution
Jan Keil - Identity and access management Facts. Challenges. SolutionJan Keil - Identity and access management Facts. Challenges. Solution
Jan Keil - Identity and access management Facts. Challenges. SolutionTimetogrowup
 
A4: Kasetsart University | FinTech and Contracts (2018)
A4: Kasetsart University | FinTech and Contracts (2018)A4: Kasetsart University | FinTech and Contracts (2018)
A4: Kasetsart University | FinTech and Contracts (2018)Kullarat Phongsathaporn
 
Initio at World Blockchain & Cryptocurrency Summit 2018
Initio at World Blockchain & Cryptocurrency Summit 2018Initio at World Blockchain & Cryptocurrency Summit 2018
Initio at World Blockchain & Cryptocurrency Summit 2018Initio
 
Cscu module 08 securing online transactions
Cscu module 08 securing online transactionsCscu module 08 securing online transactions
Cscu module 08 securing online transactionsAlireza Ghahrood
 
CPA - Introduction to Digital Identity - rev20171102
CPA - Introduction to Digital Identity - rev20171102CPA - Introduction to Digital Identity - rev20171102
CPA - Introduction to Digital Identity - rev20171102Jean-François LOMBARDO
 

Similar to Payments and AML CFT KYC (20)

Btcs corporate presentation october 2014 final
Btcs corporate presentation october 2014   finalBtcs corporate presentation october 2014   final
Btcs corporate presentation october 2014 final
 
Btcs corporate presentation october 2014 final
Btcs corporate presentation october 2014   finalBtcs corporate presentation october 2014   final
Btcs corporate presentation october 2014 final
 
ICOs, Cryptocurrency, and Tokenization: Legal Issues
ICOs, Cryptocurrency, and Tokenization: Legal Issues ICOs, Cryptocurrency, and Tokenization: Legal Issues
ICOs, Cryptocurrency, and Tokenization: Legal Issues
 
B12: AMLO | FinTech Situation in Thailand and Offshore and Money Laundering R...
B12: AMLO | FinTech Situation in Thailand and Offshore and Money Laundering R...B12: AMLO | FinTech Situation in Thailand and Offshore and Money Laundering R...
B12: AMLO | FinTech Situation in Thailand and Offshore and Money Laundering R...
 
What is Social KYC?
What is Social KYC? What is Social KYC?
What is Social KYC?
 
DLT - AML & CFT - Risks & Opportunites
DLT - AML & CFT - Risks & Opportunites DLT - AML & CFT - Risks & Opportunites
DLT - AML & CFT - Risks & Opportunites
 
Bitcoin, Block Chain, Cryptocurrency and ICOs: A Legal Perspective
Bitcoin, Block Chain, Cryptocurrency and ICOs: A Legal PerspectiveBitcoin, Block Chain, Cryptocurrency and ICOs: A Legal Perspective
Bitcoin, Block Chain, Cryptocurrency and ICOs: A Legal Perspective
 
B11: Central IP & IT Court | FinTech: Legal and Regulatory Challenges (7 Aug ...
B11: Central IP & IT Court | FinTech: Legal and Regulatory Challenges (7 Aug ...B11: Central IP & IT Court | FinTech: Legal and Regulatory Challenges (7 Aug ...
B11: Central IP & IT Court | FinTech: Legal and Regulatory Challenges (7 Aug ...
 
CASE STUDY ON PKI & BIOMETRIC BASED APPLICATION
CASE STUDY ON PKI & BIOMETRIC BASED APPLICATIONCASE STUDY ON PKI & BIOMETRIC BASED APPLICATION
CASE STUDY ON PKI & BIOMETRIC BASED APPLICATION
 
A Comprehensive Guide of KYC in Crypto Exchanges in 2023.pdf
A Comprehensive Guide of KYC in Crypto Exchanges in 2023.pdfA Comprehensive Guide of KYC in Crypto Exchanges in 2023.pdf
A Comprehensive Guide of KYC in Crypto Exchanges in 2023.pdf
 
Banker and Customer Relation
Banker and Customer RelationBanker and Customer Relation
Banker and Customer Relation
 
Simplification and Ease of User Data Verification: The Regulatory Framework f...
Simplification and Ease of User Data Verification: The Regulatory Framework f...Simplification and Ease of User Data Verification: The Regulatory Framework f...
Simplification and Ease of User Data Verification: The Regulatory Framework f...
 
SSI, TBDex Overview
SSI, TBDex Overview SSI, TBDex Overview
SSI, TBDex Overview
 
Indjic fintech module 3
Indjic fintech module 3Indjic fintech module 3
Indjic fintech module 3
 
Jan Keil - Identity and access management Facts. Challenges. Solution
Jan Keil - Identity and access management Facts. Challenges. SolutionJan Keil - Identity and access management Facts. Challenges. Solution
Jan Keil - Identity and access management Facts. Challenges. Solution
 
A4: Kasetsart University | FinTech and Contracts (2018)
A4: Kasetsart University | FinTech and Contracts (2018)A4: Kasetsart University | FinTech and Contracts (2018)
A4: Kasetsart University | FinTech and Contracts (2018)
 
Initio at World Blockchain & Cryptocurrency Summit 2018
Initio at World Blockchain & Cryptocurrency Summit 2018Initio at World Blockchain & Cryptocurrency Summit 2018
Initio at World Blockchain & Cryptocurrency Summit 2018
 
Cscu module 08 securing online transactions
Cscu module 08 securing online transactionsCscu module 08 securing online transactions
Cscu module 08 securing online transactions
 
CPA - Introduction to Digital Identity - rev20171102
CPA - Introduction to Digital Identity - rev20171102CPA - Introduction to Digital Identity - rev20171102
CPA - Introduction to Digital Identity - rev20171102
 
Kyc and Blockchain
Kyc and BlockchainKyc and Blockchain
Kyc and Blockchain
 

Recently uploaded

My Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle BaileyMy Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle Baileyhlharris
 
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...amilabibi1
 
Dreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio IIIDreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio IIINhPhngng3
 
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdfThe workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdfSenaatti-kiinteistöt
 
lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.lodhisaajjda
 
If this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaIf this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaKayode Fayemi
 
Report Writing Webinar Training
Report Writing Webinar TrainingReport Writing Webinar Training
Report Writing Webinar TrainingKylaCullinane
 
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdfAWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdfSkillCertProExams
 
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...David Celestin
 
Dreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video TreatmentDreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video Treatmentnswingard
 
Digital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of DrupalDigital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of DrupalFabian de Rijk
 
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdfSOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdfMahamudul Hasan
 
Uncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoUncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoKayode Fayemi
 
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxChiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxraffaeleoman
 

Recently uploaded (15)

My Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle BaileyMy Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle Bailey
 
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
 
Dreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio IIIDreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio III
 
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdfThe workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
 
lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.
 
If this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaIf this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New Nigeria
 
Report Writing Webinar Training
Report Writing Webinar TrainingReport Writing Webinar Training
Report Writing Webinar Training
 
ICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdfICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdf
 
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdfAWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
 
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
 
Dreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video TreatmentDreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video Treatment
 
Digital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of DrupalDigital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of Drupal
 
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdfSOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
 
Uncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoUncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac Folorunso
 
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxChiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
 

Payments and AML CFT KYC

  • 1. 1 1iSignthis © 2015 iSignthis Ltd (ASX : ISX ) Transactions Drive e-Identity: Payments and AML/CTF KYC MODERATOR: Hue Dang, CAMS Head of Asia, ACAMS Jointly Presented by: Managing Director John Karantzis B.E., LL.M, M.Ent, FIEAust Director Scott W Minehane B.Econ LL.B., LL.M
  • 2. 2 What drives the need for e- Identity? Transactions! People are identified when they want to do something…….. Buy, sell, trade, receive goods and services. The internet means we need to adapt to how we approach identity. Regulated (online) transactions are subject to: •  Financial Identity (KYC) •  Privacy / Data Protection law •  Doing things well reduces compliance costs and enhances the customer experience
  • 3. 3 Today’s Presentation 1.  Identity? What is it? 2.  Regulatory Approaches to Identity i.  European Union ii.  South Korea iii.  Hong Kong iv.  Singapore v.  Australia 3.  Private Sector – Who needs identity? 4.  How do we establish identity? a.  Physical Documents b.  Static Electronic Verification c.  Dynamic Electronic Verification 5.  Conclusions
  • 4. 4 1. What is Identity A lawful or legally standing association, corporation, partnership, proprietorship, trust, or individual. Has legal capacity to: •  enter into agreements or contracts, •  assume obligations, •  incur and pay debts, •  sue and be sued in its own right, and •  to be accountable for illegal activities.
  • 5. 5 1a. What is Digital Identity? •  Lets look at how Privacy law treats identity: •  In the US, the law provides multiple definitions of Personally Identifiable Information (PII), most focusing on whether the information pertains to an (already) identified person. •  By way of contrast, in the EU, there is a single definition of personal data to encompass all information identifiable to a person. •  The E.U. Data Protection Directive defines “an identifiable” person as “one who can be identified, directly, or indirectly, in particular by reference to an identification number or to one or more factors specific to his physical, physiological, mental, economic, cultural, or social identity.”
  • 6. 6 2. Regulatory approaches to identity 1.  “Specific Type Approach” : Regulations specifically state the means or what must be done 2.  “Non Public Approach” : regulations seek to make use of information that is not in the public domain to identify a person 3.  “Principles Based Approach” :State the outcome rather than the means. The means may include elements of Specific Type and Non Public, as well as other means. 4.  FATF ‘risk based approach’ favours move towards ‘Principles based Approach’.
  • 7. 7 Guiding Principle for FATF legislative model jurisdictions “Customer due diligence measures shall comprise: Identifying the customer and verifying the customer's identity on the basis of documents, data or information obtained from a reliable and independent source;” 2a. FATF Recommendations #5 (Principles Based Approach)
  • 8. 8 Consider the following factors with regards to data •  (a) its accuracy; •  (b) how secure it is; •  (c) how the data is kept up-to-date / its recency •  (d) how comprehensive the data is •  (e) whether the data is maintained by a government body or pursuant to legislation; and •  (f) whether the electronic data can be additionally authenticated 2b. What is a reliable source of data?
  • 9. 9 2 (i). ’Identifying’ the customer (EU) •  In the EU, any “unique” attribute is sufficient to identify a person (Principle based) •  However, EU all member states require verification of name + address (UK, IRL, SE) •  Some states require verification of age as well : name + address + age (Eg FR, IT and BG).
  • 10. 10 South Korea’s Article 38 (of 2010 AMLCTF Regs) takes a specific approach. Identifying a customer is defined as : •  name, •  Address, •  identity or travel document incl. number and type If not a Korean Citizen, also require •  date of birth •  nationality, 2 (ii). ’Identifying’ the customer (KOR)
  • 11. 11 Article 35 (Non face-to-face transactions) (1) Financial institutions shall establish policies and procedures to address the risk of ML/TF related to non-face-to-face transactions. 2 (ii). Remote ’Verifying’ the customer (KOR)
  • 12. 12 2 (ii). ’Identifying’ the customer (HKG) Hong Kong takes a specific approach via the Guidance Note GN33 (March 2015), similar to South Korea’s Article 38 Identifying a customer is defined as : •  name, •  Address, •  date of birth •  nationality •  identity or travel document incl. number and type
  • 13. 13 FI must carry out at least one of the following measures for remote on-boarding: a.  Use additional sources of documents, data or information b.  taking supplementary measures to verify all the information provided by the customer; c.  ensuring that the first payment made into the customer’s account is received from an account in the customer’s name with an authorized institution in an equivalent jurisdiction…… 2 (iii). Remote ‘Verifying’ the customer (HKG)
  • 14. 14 2 (iv). Remote ‘Verifying’ the customer (SGP) MAS 626 (New Guidelines 24 April 2015) –Appropriate measures to address risks arising from undertaking transactions via internet, by using one or more of: (a) Independent telephone verification of customer; (b) confirmation of the customer’s address; (c) confirmation of the customer’s employment status; (d) customer’s salary confirmation by use of recent bank statements from another bank; (e) qualified 3rd party certification of identification documents (f) requiring the first payment to be carried out through an account in the customer’s name with another FI subject to similar or equivalent customer due diligence standards;
  • 15. 15 The reporting entity must collect and verify the following KYC information: i.  the customer’s full name; and Collect both of, but verify either /any one of : a.  the customer’s date of birth, or b.  the customer’s residential address. 2 (iv). ’Identifying’ and ‘Verifying’ the customer (AUS)
  • 16. 16 0 1 2 3 4 5 6 7 AUS/UK/US/SE IT/FR/BG KOR HKG SGP Name + Address Or Name + DoB Name + Address+ DoB Name + Address+ DoB + Nationality + GovID + [SGP] Contact Details 2(v). Summary : # of Attributes to be Verified.
  • 17. 17 3. Private Sector: Who needs Identity? •  Payment processors : compliance requirement for AML KYC & /or ECB SecuRE Pay. •  eMerchants in the SEPA/EU28 as part of the ECB’s Strong Customer Authentication. •  Stock Brokers •  Financial Systems requiring two factor authentication technology •  Banks (incl debit, card issuers) •  Commodity/Bullion Brokers •  Crypto Currency Exchanges (e.g. bitcoin) •  Real Estate Sales/Rental Agents •  Travel Agents (US Patriot Act) •  Life Insurers •  Accountants/Auditors/Lawyers •  Financial Advisors/Super Funds •  eWallets/mWallet Providers •  Money remittance p2p •  Loan/Pawn Providers •  eCasino/eGaming/eWagering •  Any business routinely trading > US $10k/transaction •  Currency Exchange Payment Processing Financial Professional Services Others
  • 18. 18 Customer Ease Lower Cost LOCAL AUTOMATED MANUAL Notarised: posted/uploaded documents* ‘Experian’ or ‘GBGroup’ style static, credit database search (UK, US, AU) Face to face checks iSignthis + PayPal GLOBAL •  No dynamic means to include customer on request if not already a historic customer of a credit reporting agency. •  Requires cross check of other databases. •  Typical coverage of 60% of online applicants •  >3Bn accessible global payment instruments. •  No need for user’s disclosure of bank details to a third party. Lower Friction Remote on boarding 3. Private Sector: Who needs Identity?
  • 19. 19 Two ways: (i) Face to Face– from reliable document sources, normally using government issued photo identity documents. Typically, we look for; •  Proof of Identity (POI) – birth certificate, marriage certificate •  Evidence of Identity (EOI) – government issued ID or bank accounts/cards •  Social Footprint – utility bills, payments, insurances (ii) Electronic Verification (EV) – from reliable data or information sources 4. How do we establish identity?
  • 20. 20 The EU’s Public Register of Authentic Identity and Travel Documents Online (PRADO), recommends: “When checking security features of documents: FEEL, LOOK, TILT!” And “Check the validity of document numbers – [via] List of links to websites with information on invalid document numbers” http://prado.consilium.europa.eu 4a (i). Approach 1 – Physical Documents (Challenges – Authenticity, Validity, Transformation, Verification) en.wikipedia.org/wiki/European_driving_licence
  • 21. 21 4a (i). Transforming – Physical Documents (Challenges – Authenticity, Validity, Transformation, Verification) •  Trend in some countries towards using Webcams or non-Certified images. •  Scanners/Webcams – can’t look, feel tilt ; so, how valid, “reliable” or “independent is uploading of an identity document(s)? •  How reliable is a comparison of a photo on such a document via webcam? •  There is no EU or global register of stolen credentials…how is validity of these documents checked? •  Can a document be transitioned from physical to become “data” or information without verification as to its reliability or validity by issuer?
  • 22. 22 Is there a legal basis to rely upon non issuer/third party transformed physical documents? •  NO! This approach is specifically prohibited or not endorsed by regulators in many jurisdictions: •  Eg, Germany (legislation), HKG (GN33 @ 4.12.2), Singapore (MAS Guidance Note @ 33), Australia (AML Regs), Korea (Original or certified, Per AMLCTF Reg 39), UK (AML2007, 14(2)(c)), Canada (Schedule 7) •  We could not find direct support in any EU, Australian or Asia AML/CTF regulation that supports the concept of digital transformation of documents to data as constituting a reliable source of data – unless a qualified person certifies the document 4a (ii). Transforming – Physical Documents
  • 23. 23 Breach Size 80m , Jan 15 Breach Size 1m , Nov 14 Static database – electoral, credit, passport, drivers license Relies on “Non Public Approach” Knowledge Based Authentication (KBA) – comparison of collected data to database. Issues •  Highly localised, no global approach •  Much of the data is public or easily obtained. •  No revocation means if say wallet stolen or mailbox compromised •  Data may not change between KBA making ongoing due diligence risible susceptible to ghosting and/or takeover •  Simple to ‘reverse or social engineer’ the KBA •  Once breached, re-credentialing of individuals is difficult – data becomes “public” – what now? 4a (ii). Approach 2: Static Database Electronic Verification (Non Public Approach)
  • 24. 24 Physical Identification Proof of Identity Documents E- Payment Account Accounts Unique Regulated AML (Identifies Person) Verify Account Once verified - “Reliable” Source for EV (AML) KYC Identity Sanction Screen + Monitor Validate data Secondary Sources of Data 150m people 200 countries 4C. Approach 3: Dynamic Re-Use of Bank ID (Principles based)
  • 25. 25 25 Direct Account Access 1.  Request account login details from customer 2.  Service Provider Accesses account 3.  SP Confirms account is active and retrieve details associated with account Key Risk : requires customer to provide Sensitive Account Data (login details + Password) Key Limitation : limited to 350m bank accounts, mainly in SEPA. No credit card support. Global – legal, risk, liability issues? Indirect Account Access via KBA 1.  Service Provider creates a “secret” using payment against payment instrument and Process secret to a statement of account 2.  Ask customer to retrieve secret from payment instrument “secure area” Key advantages : i)  Customer Sensitive Account Data not exposed to 3rd party ii)  Global : Leverages more than 3.5Bn cards and bank accounts across 200 countries iii)  Risks reduced for all parties incl operator liability under eIDAS for data breach 4C (i). Approach 3: Dynamic Electronic Verification
  • 26. 26 26 4C (ii). KBA Example: iSignthis & PayPal
  • 27. 27 Payment Data (Merchant, Acquirer, Card Details, Name, Amount, Time, Place, IIN Data + Country of issue) Authentication + Validation Data (Geodata, device data, SAD, phone number, SMS) Device Data (MAC, IMEI, CPE, Language, OS) Network Data : IP Address, Carrier, Channel, route, Cell Tower Delivery Data Address, Phone Under EU law, all of this is PII – identifiable to a person Under US law, taken as a whole, this is also PII – identifies a person. 4C (iii). Advantages of Transactional Approach: Metadata is the DNA of a payment message
  • 28. 28 Link Identity & Payment Account with 2FA First Factor: User selected Passcode Second Factor: One Time Password by SMS Or Assurity(.sg) hard token iSignthis Identity : AML/CTF KYC Identity traced & linked to 2FA and/or Identity file created Customer transacts with eMerchant Online or mobile Customer iSignthis process takes place post cart checkout, ensuring high conversion rates. 4c (iv). A reliable means to generate identity on demand
  • 29. 29 Passporting: •  Country <> Country •  AML Service <> AML Service •  AML Service <>Government Possible in most jurisdictions provided that source is from an equivalency jurisdiction – not necessarily FATF. 5. Global application- Passporting
  • 30. 30 •  Transactions drive e-identity. And ought do so – ‘pre- boarding’ is an outmoded concept for online, and On- boarding customers for the sake of doing so is expensive and unnecessary. •  Identity is complex. Legally establishing identity is even more complex. •  Ultimately given its importance to ecommerce a scalable, dynamic electronic verification approach to identity is important taking into account security, costs and the user experience •  Global opportunities via passporting approach. •  Documents are not data unless transformed by a qualified certifying party. Key Takeaways
  • 31. 31 Sales: Andrew Karantzis andrew.karantzis@isignthis.com +61 411 428 259 For further information contact: