Payments and AML CFT KYC

Martin Chan
Martin ChanSenior Recruitment Consultant at Carlton Senior Appointments em Carlton Executives
1
1iSignthis © 2015
iSignthis Ltd (ASX : ISX )
Transactions Drive e-Identity:
Payments and AML/CTF KYC
MODERATOR:
Hue Dang, CAMS
Head of Asia, ACAMS
Jointly Presented by:
Managing Director
John Karantzis B.E., LL.M, M.Ent, FIEAust
Director
Scott W Minehane B.Econ LL.B., LL.M
2
What drives the need for e- Identity?
Transactions!
People are identified when they want to do something……..
Buy, sell, trade, receive goods and services.
The internet means we need to adapt to how we approach identity.
Regulated (online) transactions are subject to:
•  Financial Identity (KYC)
•  Privacy / Data Protection law
•  Doing things well reduces compliance costs and enhances the customer experience
3
Today’s Presentation
1.  Identity? What is it?
2.  Regulatory Approaches to Identity
i.  European Union
ii.  South Korea
iii.  Hong Kong
iv.  Singapore
v.  Australia
3.  Private Sector – Who needs identity?
4.  How do we establish identity?
a.  Physical Documents
b.  Static Electronic Verification
c.  Dynamic Electronic Verification
5.  Conclusions
4
1. What is Identity
A lawful or legally standing association, corporation,
partnership, proprietorship, trust, or individual.
Has legal capacity to:
•  enter into agreements or contracts,
•  assume obligations,
•  incur and pay debts,
•  sue and be sued in its own right, and
•  to be accountable for illegal activities.
5
1a. What is Digital Identity?
•  Lets look at how Privacy law treats identity:
•  In the US, the law provides multiple definitions of Personally Identifiable
Information (PII), most focusing on whether the information pertains to an
(already) identified person.
•  By way of contrast, in the EU, there is a single definition of personal data to
encompass all information identifiable to a person.
•  The E.U. Data Protection Directive defines “an identifiable” person as “one who
can be identified, directly, or indirectly, in particular by reference to an identification
number or to one or more factors specific to his physical, physiological, mental,
economic, cultural, or social identity.”
6
2. Regulatory approaches to identity
1.  “Specific Type Approach” : Regulations specifically state the
means or what must be done
2.  “Non Public Approach” : regulations seek to make use of
information that is not in the public domain to identify a person
3.  “Principles Based Approach” :State the outcome rather than the
means. The means may include elements of Specific Type and
Non Public, as well as other means.
4.  FATF ‘risk based approach’ favours move towards ‘Principles
based Approach’.
7
Guiding Principle for FATF legislative model jurisdictions
“Customer due diligence measures shall comprise:
Identifying the customer and verifying the customer's identity on
the basis of documents, data or information obtained from a
reliable and independent source;”
2a. FATF Recommendations #5
(Principles Based Approach)
8
Consider the following factors with regards to data
•  (a) its accuracy;
•  (b) how secure it is;
•  (c) how the data is kept up-to-date / its recency
•  (d) how comprehensive the data is
•  (e) whether the data is maintained by a government
body or pursuant to legislation; and
•  (f) whether the electronic data can be additionally
authenticated
2b. What is a reliable source of data?
9
2 (i). ’Identifying’ the customer (EU)
•  In the EU, any “unique” attribute is sufficient to identify a
person (Principle based)
•  However, EU all member states require verification of
name + address (UK, IRL, SE)
•  Some states require verification of age as well : name +
address + age (Eg FR, IT and BG).
10
South Korea’s Article 38 (of 2010 AMLCTF Regs)
takes a specific approach.
Identifying a customer is defined as :
•  name,
•  Address,
•  identity or travel document incl. number and type
If not a Korean Citizen, also require
•  date of birth
•  nationality,
2 (ii). ’Identifying’ the customer (KOR)
11
Article 35 (Non face-to-face transactions)
(1) Financial institutions shall establish policies and
procedures to address the risk of ML/TF related to
non-face-to-face transactions.
2 (ii). Remote ’Verifying’ the customer (KOR)
12
2 (ii). ’Identifying’ the customer (HKG)
Hong Kong takes a specific approach via the Guidance Note
GN33 (March 2015), similar to South Korea’s Article 38
Identifying a customer is defined as :
•  name,
•  Address,
•  date of birth
•  nationality
•  identity or travel document incl. number and type
13
FI must carry out at least one of the following measures for
remote on-boarding:
a.  Use additional sources of documents, data or information
b.  taking supplementary measures to verify all the information
provided by the customer;
c.  ensuring that the first payment made into the customer’s
account is received from an account in the customer’s name
with an authorized institution in an equivalent jurisdiction……
2 (iii). Remote ‘Verifying’ the customer (HKG)
14
2 (iv). Remote ‘Verifying’ the customer (SGP)
MAS 626 (New Guidelines 24 April 2015) –Appropriate measures to
address risks arising from undertaking transactions via internet, by
using one or more of:
(a) Independent telephone verification of customer;
(b) confirmation of the customer’s address;
(c) confirmation of the customer’s employment status;
(d) customer’s salary confirmation by use of recent bank
statements from another bank;
(e) qualified 3rd party certification of identification documents
(f) requiring the first payment to be carried out through an account in
the customer’s name with another FI subject to similar or equivalent
customer due diligence standards;
15
The reporting entity must collect and verify the following
KYC information:
i.  the customer’s full name; and
Collect both of, but verify either /any one of :
a.  the customer’s date of birth, or
b.  the customer’s residential address.
2 (iv). ’Identifying’ and ‘Verifying’ the customer (AUS)
16
0
1
2
3
4
5
6
7
AUS/UK/US/SE IT/FR/BG KOR HKG SGP
Name + Address
Or Name + DoB
Name + Address+ DoB Name + Address+ DoB + Nationality +
GovID + [SGP] Contact Details
2(v). Summary : # of Attributes to be Verified.
17
3. Private Sector: Who needs Identity?
•  Payment processors : compliance
requirement for AML KYC & /or
ECB SecuRE Pay.
•  eMerchants in the SEPA/EU28 as
part of the ECB’s Strong Customer
Authentication.
•  Stock Brokers
•  Financial Systems requiring two
factor authentication technology
•  Banks (incl debit, card issuers)
•  Commodity/Bullion Brokers
•  Crypto Currency Exchanges (e.g.
bitcoin)
•  Real Estate Sales/Rental Agents
•  Travel Agents (US Patriot Act)
•  Life Insurers
•  Accountants/Auditors/Lawyers
•  Financial Advisors/Super Funds
•  eWallets/mWallet Providers
•  Money remittance p2p
•  Loan/Pawn Providers
•  eCasino/eGaming/eWagering
•  Any business routinely trading >
US $10k/transaction
•  Currency Exchange
Payment
Processing
Financial
Professional
Services
Others
18
Customer
Ease
Lower
Cost
LOCAL
AUTOMATED
MANUAL
Notarised:
posted/uploaded documents*
‘Experian’ or ‘GBGroup’ style static,
credit database search (UK, US, AU)
Face to face checks
iSignthis + PayPal
GLOBAL
•  No dynamic means to include customer
on request if not already a historic
customer of a credit reporting agency.
•  Requires cross check of other databases.
•  Typical coverage of 60% of online applicants
•  >3Bn accessible global
payment instruments.
•  No need for user’s disclosure of bank
details to a third party.
Lower
Friction
Remote
on boarding
3. Private Sector: Who needs Identity?
19
Two ways:
(i) Face to Face– from reliable document sources, normally using
government issued photo identity documents.
Typically, we look for;
•  Proof of Identity (POI) – birth certificate, marriage certificate
•  Evidence of Identity (EOI) – government issued ID or bank accounts/cards
•  Social Footprint – utility bills, payments, insurances
(ii) Electronic Verification (EV) – from reliable data or information sources
4. How do we establish identity?
20
The EU’s Public Register of Authentic
Identity and Travel Documents Online
(PRADO), recommends:
“When checking security features of documents:
FEEL, LOOK, TILT!”
And
“Check the validity of document numbers – [via]
List of links to websites with information on invalid
document numbers”
http://prado.consilium.europa.eu
4a (i). Approach 1 – Physical Documents
(Challenges – Authenticity, Validity, Transformation, Verification)
en.wikipedia.org/wiki/European_driving_licence
21
4a (i). Transforming – Physical Documents
(Challenges – Authenticity, Validity, Transformation, Verification)
•  Trend in some countries towards using Webcams or non-Certified
images.
•  Scanners/Webcams – can’t look, feel tilt ; so, how valid, “reliable”
or “independent is uploading of an identity document(s)?
•  How reliable is a comparison of a photo on such a document via
webcam?
•  There is no EU or global register of stolen credentials…how is
validity of these documents checked?
•  Can a document be transitioned from physical to become “data”
or information without verification as to its reliability or validity by
issuer?
22
Is there a legal basis to rely upon non issuer/third party
transformed physical documents?
•  NO! This approach is specifically prohibited or not endorsed by regulators
in many jurisdictions:
•  Eg, Germany (legislation), HKG (GN33 @ 4.12.2), Singapore (MAS
Guidance Note @ 33), Australia (AML Regs), Korea (Original or certified,
Per AMLCTF Reg 39), UK (AML2007, 14(2)(c)), Canada (Schedule 7)
•  We could not find direct support in any EU, Australian or Asia AML/CTF
regulation that supports the concept of digital transformation of
documents to data as constituting a reliable source of data – unless a
qualified person certifies the document
4a (ii). Transforming – Physical Documents
23
Breach Size
80m , Jan 15
Breach Size
1m , Nov 14
Static database – electoral, credit, passport, drivers license
Relies on “Non Public Approach” Knowledge Based Authentication
(KBA) – comparison of collected data to database.
Issues
•  Highly localised, no global approach
•  Much of the data is public or easily obtained.
•  No revocation means if say wallet stolen or mailbox compromised
•  Data may not change between KBA making ongoing due diligence
risible susceptible to ghosting and/or takeover
•  Simple to ‘reverse or social engineer’ the KBA
•  Once breached, re-credentialing of individuals is difficult – data
becomes “public” – what now?
4a (ii). Approach 2: Static Database Electronic Verification
(Non Public Approach)
24
Physical
Identification
Proof of Identity
Documents
E- Payment
Account
Accounts
Unique
Regulated AML
(Identifies
Person)
Verify Account
Once verified -
“Reliable” Source
for EV (AML)
KYC Identity
Sanction Screen
+ Monitor
Validate data
Secondary
Sources of Data
150m people
200 countries
4C. Approach 3: Dynamic Re-Use of Bank ID
(Principles based)
25
25
Direct Account Access
1.  Request account login details from
customer
2.  Service Provider Accesses account
3.  SP Confirms account is active and retrieve
details associated with account
Key Risk : requires customer to provide Sensitive
Account Data (login details + Password)
Key Limitation : limited to 350m bank accounts,
mainly in SEPA. No credit card support.
Global – legal, risk, liability issues?
Indirect Account Access via KBA
1.  Service Provider creates a “secret” using
payment against payment instrument and
Process secret to a statement of account
2.  Ask customer to retrieve secret from payment
instrument “secure area”
Key advantages :
i)  Customer Sensitive Account Data not exposed
to 3rd party
ii)  Global : Leverages more than 3.5Bn cards and
bank accounts across 200 countries
iii)  Risks reduced for all parties incl operator
liability under eIDAS for data breach
4C (i). Approach 3: Dynamic Electronic Verification
26
26
4C (ii). KBA Example: iSignthis & PayPal
27
Payment Data (Merchant, Acquirer, Card
Details, Name, Amount, Time, Place, IIN
Data + Country of issue)
Authentication + Validation Data
(Geodata, device data, SAD, phone
number, SMS)
Device Data
(MAC, IMEI, CPE, Language, OS)
Network Data : IP
Address, Carrier,
Channel, route, Cell
Tower
Delivery Data
Address, Phone
Under EU law, all of this is PII – identifiable to a person
Under US law, taken as a whole, this is also PII – identifies a person.
4C (iii). Advantages of Transactional Approach:
Metadata is the DNA of a payment message
28
Link Identity & Payment Account with 2FA
First Factor: User selected Passcode
Second Factor: One Time Password by SMS
Or Assurity(.sg) hard token
iSignthis Identity :
AML/CTF KYC Identity
traced & linked to 2FA
and/or Identity file created
Customer transacts
with eMerchant
Online or mobile
Customer
iSignthis process takes
place post cart checkout,
ensuring high conversion
rates.
4c (iv). A reliable means to generate identity on demand
29
Passporting:
•  Country <> Country
•  AML Service <> AML Service
•  AML Service <>Government
Possible in most jurisdictions provided that source is from an
equivalency jurisdiction – not necessarily FATF.
5. Global application- Passporting
30
•  Transactions drive e-identity. And ought do so – ‘pre-
boarding’ is an outmoded concept for online, and On-
boarding customers for the sake of doing so is expensive
and unnecessary.
•  Identity is complex. Legally establishing identity is even
more complex.
•  Ultimately given its importance to ecommerce a scalable,
dynamic electronic verification approach to identity is
important taking into account security, costs and the user
experience
•  Global opportunities via passporting approach.
•  Documents are not data unless transformed by a qualified
certifying party.
Key Takeaways
31
Sales:
Andrew Karantzis
andrew.karantzis@isignthis.com
+61 411 428 259
For further information contact:
1 de 31

Recomendados

Anti-Money Laundering Seminar por
Anti-Money Laundering SeminarAnti-Money Laundering Seminar
Anti-Money Laundering SeminarMcInerney Saunders
3.3K visualizações41 slides
Anti Money Laundering - CDD & KYC por
Anti Money Laundering - CDD & KYCAnti Money Laundering - CDD & KYC
Anti Money Laundering - CDD & KYCBesart Qerimi
44.7K visualizações20 slides
Money Laundering Presentation por
Money Laundering PresentationMoney Laundering Presentation
Money Laundering PresentationRahul Magan,MBA Finance
18.4K visualizações21 slides
AML presentation por
AML presentationAML presentation
AML presentationJowhar Roshan
11.2K visualizações75 slides
mr neeraj - day 2 - aml kyc por
mr neeraj - day 2 - aml kycmr neeraj - day 2 - aml kyc
mr neeraj - day 2 - aml kycNeeraj Verma
722 visualizações44 slides
Insurance anti money laundering por
Insurance   anti money launderingInsurance   anti money laundering
Insurance anti money launderingMohit Singla
10K visualizações31 slides

Mais conteúdo relacionado

Mais procurados

Aml&kyc 1 por
Aml&kyc 1Aml&kyc 1
Aml&kyc 1Subhalakshmi Girish
2.9K visualizações51 slides
KYC Know Your Customer por
KYC Know Your CustomerKYC Know Your Customer
KYC Know Your CustomerTaha Khan
261 visualizações3 slides
Prevention of money laundering class room notes for ca icma por
Prevention of money laundering class room notes for ca icma Prevention of money laundering class room notes for ca icma
Prevention of money laundering class room notes for ca icma pavan kumar
5.3K visualizações62 slides
Anti-money laundering presentation por
Anti-money laundering presentationAnti-money laundering presentation
Anti-money laundering presentationElias Mose
18K visualizações80 slides
Money Laundering and Its Fall-out - ROLE OF BANKS & FINANCIAL INSTITUTIONS I... por
Money Laundering  and Its Fall-out - ROLE OF BANKS & FINANCIAL INSTITUTIONS I...Money Laundering  and Its Fall-out - ROLE OF BANKS & FINANCIAL INSTITUTIONS I...
Money Laundering and Its Fall-out - ROLE OF BANKS & FINANCIAL INSTITUTIONS I...Resurgent India
2.4K visualizações18 slides
Anti money laundering por
Anti money launderingAnti money laundering
Anti money launderingUttma Shukla
91.2K visualizações41 slides

Mais procurados(20)

KYC Know Your Customer por Taha Khan
KYC Know Your CustomerKYC Know Your Customer
KYC Know Your Customer
Taha Khan261 visualizações
Prevention of money laundering class room notes for ca icma por pavan kumar
Prevention of money laundering class room notes for ca icma Prevention of money laundering class room notes for ca icma
Prevention of money laundering class room notes for ca icma
pavan kumar5.3K visualizações
Anti-money laundering presentation por Elias Mose
Anti-money laundering presentationAnti-money laundering presentation
Anti-money laundering presentation
Elias Mose18K visualizações
Money Laundering and Its Fall-out - ROLE OF BANKS & FINANCIAL INSTITUTIONS I... por Resurgent India
Money Laundering  and Its Fall-out - ROLE OF BANKS & FINANCIAL INSTITUTIONS I...Money Laundering  and Its Fall-out - ROLE OF BANKS & FINANCIAL INSTITUTIONS I...
Money Laundering and Its Fall-out - ROLE OF BANKS & FINANCIAL INSTITUTIONS I...
Resurgent India2.4K visualizações
Anti money laundering por Uttma Shukla
Anti money launderingAnti money laundering
Anti money laundering
Uttma Shukla91.2K visualizações
KYC AML regulation in EU por Muthu Siva
KYC AML regulation in EUKYC AML regulation in EU
KYC AML regulation in EU
Muthu Siva13.4K visualizações
Anti Money Laundering por Taha Khan
Anti Money LaunderingAnti Money Laundering
Anti Money Laundering
Taha Khan411 visualizações
Presentation AML por Mirsazzad
Presentation AMLPresentation AML
Presentation AML
Mirsazzad1.6K visualizações
Virtual Currency Compliance: Anti-Money Laundering por Jay Postma
Virtual Currency Compliance: Anti-Money LaunderingVirtual Currency Compliance: Anti-Money Laundering
Virtual Currency Compliance: Anti-Money Laundering
Jay Postma1.7K visualizações
Anti money laundering - PEPs por Besart Qerimi
Anti money laundering - PEPsAnti money laundering - PEPs
Anti money laundering - PEPs
Besart Qerimi4.1K visualizações
Basics of Anti-Money Laundering : A Really Quick Primer por complianceonline123
Basics of Anti-Money Laundering : A Really Quick PrimerBasics of Anti-Money Laundering : A Really Quick Primer
Basics of Anti-Money Laundering : A Really Quick Primer
complianceonline1239.6K visualizações
Aml & kyc por Satyajit Dutta
Aml & kyc Aml & kyc
Aml & kyc
Satyajit Dutta7.3K visualizações
ANTI MONEY LAUNDERING REGULATIONS, UAE por Jino M Kurian
ANTI MONEY LAUNDERING REGULATIONS, UAEANTI MONEY LAUNDERING REGULATIONS, UAE
ANTI MONEY LAUNDERING REGULATIONS, UAE
Jino M Kurian2.3K visualizações
How to Improve Anti-Money Laundering Investigation using Neo4j por Neo4j
How to Improve Anti-Money Laundering Investigation using Neo4jHow to Improve Anti-Money Laundering Investigation using Neo4j
How to Improve Anti-Money Laundering Investigation using Neo4j
Neo4j1.3K visualizações
KYC/AML 2016 por Roger Claessens
KYC/AML 2016KYC/AML 2016
KYC/AML 2016
Roger Claessens4.7K visualizações
E-book: How to manage Anti-Money Laundering and Counter Financing of Terroris... por Jitske de Bruijne
E-book: How to manage Anti-Money Laundering and Counter Financing of Terroris...E-book: How to manage Anti-Money Laundering and Counter Financing of Terroris...
E-book: How to manage Anti-Money Laundering and Counter Financing of Terroris...
Jitske de Bruijne1.4K visualizações
Aml cft training programme por Subhalakshmi Girish
Aml cft training programmeAml cft training programme
Aml cft training programme
Subhalakshmi Girish15.3K visualizações
Risk Based Approach to Anti Money Laundering and Counter Terrorist Financing por IIR Middle East
Risk Based Approach to Anti Money Laundering and Counter Terrorist Financing Risk Based Approach to Anti Money Laundering and Counter Terrorist Financing
Risk Based Approach to Anti Money Laundering and Counter Terrorist Financing
IIR Middle East 1.9K visualizações

Destaque

Aml basics por
Aml basicsAml basics
Aml basicsDavid F Amakobe
1.7K visualizações13 slides
StubbsGazette AML/CFT EBook for Credit Unions por
StubbsGazette AML/CFT EBook for Credit UnionsStubbsGazette AML/CFT EBook for Credit Unions
StubbsGazette AML/CFT EBook for Credit UnionsStubbsGazette
829 visualizações24 slides
Anti-Money Laundering and Countering the Financing of Terrorism - StubbsGazet... por
Anti-Money Laundering and Countering the Financing of Terrorism - StubbsGazet...Anti-Money Laundering and Countering the Financing of Terrorism - StubbsGazet...
Anti-Money Laundering and Countering the Financing of Terrorism - StubbsGazet...StubbsGazette
791 visualizações19 slides
Benelux forum 2014 - KYC registry por
Benelux forum 2014 - KYC registryBenelux forum 2014 - KYC registry
Benelux forum 2014 - KYC registrySWIFT
866 visualizações25 slides
Benelux forum 2014 - Compliance Analytics por
Benelux forum 2014 - Compliance AnalyticsBenelux forum 2014 - Compliance Analytics
Benelux forum 2014 - Compliance AnalyticsSWIFT
890 visualizações14 slides
out (96) por
out (96)out (96)
out (96)Karen Pamer MS, CAMS, CFE
495 visualizações77 slides

Destaque(12)

Aml basics por David F Amakobe
Aml basicsAml basics
Aml basics
David F Amakobe1.7K visualizações
StubbsGazette AML/CFT EBook for Credit Unions por StubbsGazette
StubbsGazette AML/CFT EBook for Credit UnionsStubbsGazette AML/CFT EBook for Credit Unions
StubbsGazette AML/CFT EBook for Credit Unions
StubbsGazette829 visualizações
Anti-Money Laundering and Countering the Financing of Terrorism - StubbsGazet... por StubbsGazette
Anti-Money Laundering and Countering the Financing of Terrorism - StubbsGazet...Anti-Money Laundering and Countering the Financing of Terrorism - StubbsGazet...
Anti-Money Laundering and Countering the Financing of Terrorism - StubbsGazet...
StubbsGazette791 visualizações
Benelux forum 2014 - KYC registry por SWIFT
Benelux forum 2014 - KYC registryBenelux forum 2014 - KYC registry
Benelux forum 2014 - KYC registry
SWIFT866 visualizações
Benelux forum 2014 - Compliance Analytics por SWIFT
Benelux forum 2014 - Compliance AnalyticsBenelux forum 2014 - Compliance Analytics
Benelux forum 2014 - Compliance Analytics
SWIFT890 visualizações
4. op risk and aml por crmbasel
4. op risk and aml4. op risk and aml
4. op risk and aml
crmbasel1.3K visualizações
Financial crime anti-money laundering - bovill briefing por Bovill
Financial crime   anti-money laundering - bovill briefingFinancial crime   anti-money laundering - bovill briefing
Financial crime anti-money laundering - bovill briefing
Bovill6.1K visualizações
Anti-Money Laundering (AML) Risk Assessment Process por accenture
Anti-Money Laundering (AML) Risk Assessment ProcessAnti-Money Laundering (AML) Risk Assessment Process
Anti-Money Laundering (AML) Risk Assessment Process
accenture20.6K visualizações
ICBC AML Risk-Based Approach (Jan 2011) by Bachir El Nakib por Bachir El-Nakib, CAMS
ICBC AML Risk-Based Approach (Jan 2011) by Bachir El NakibICBC AML Risk-Based Approach (Jan 2011) by Bachir El Nakib
ICBC AML Risk-Based Approach (Jan 2011) by Bachir El Nakib
Bachir El-Nakib, CAMS10.3K visualizações
Combating monel laundering por uelstudent123
Combating monel launderingCombating monel laundering
Combating monel laundering
uelstudent1232.1K visualizações

Similar a Payments and AML CFT KYC

Btcs corporate presentation october 2014 final por
Btcs corporate presentation october 2014   finalBtcs corporate presentation october 2014   final
Btcs corporate presentation october 2014 finalRedChip Companies, Inc.
1.2K visualizações34 slides
Btcs corporate presentation october 2014 final por
Btcs corporate presentation october 2014   finalBtcs corporate presentation october 2014   final
Btcs corporate presentation october 2014 finalRedChip Companies, Inc.
3.1K visualizações34 slides
ICOs, Cryptocurrency, and Tokenization: Legal Issues por
ICOs, Cryptocurrency, and Tokenization: Legal Issues ICOs, Cryptocurrency, and Tokenization: Legal Issues
ICOs, Cryptocurrency, and Tokenization: Legal Issues Roger Royse
390 visualizações37 slides
B12: AMLO | FinTech Situation in Thailand and Offshore and Money Laundering R... por
B12: AMLO | FinTech Situation in Thailand and Offshore and Money Laundering R...B12: AMLO | FinTech Situation in Thailand and Offshore and Money Laundering R...
B12: AMLO | FinTech Situation in Thailand and Offshore and Money Laundering R...Kullarat Phongsathaporn
43 visualizações15 slides
What is Social KYC? por
What is Social KYC? What is Social KYC?
What is Social KYC? Cordula Schellenberger
296 visualizações9 slides
DLT - AML & CFT - Risks & Opportunites por
DLT - AML & CFT - Risks & Opportunites DLT - AML & CFT - Risks & Opportunites
DLT - AML & CFT - Risks & Opportunites Philip Vasquez
218 visualizações23 slides

Similar a Payments and AML CFT KYC(20)

Btcs corporate presentation october 2014 final por RedChip Companies, Inc.
Btcs corporate presentation october 2014   finalBtcs corporate presentation october 2014   final
Btcs corporate presentation october 2014 final
RedChip Companies, Inc.1.2K visualizações
Btcs corporate presentation october 2014 final por RedChip Companies, Inc.
Btcs corporate presentation october 2014   finalBtcs corporate presentation october 2014   final
Btcs corporate presentation october 2014 final
RedChip Companies, Inc.3.1K visualizações
ICOs, Cryptocurrency, and Tokenization: Legal Issues por Roger Royse
ICOs, Cryptocurrency, and Tokenization: Legal Issues ICOs, Cryptocurrency, and Tokenization: Legal Issues
ICOs, Cryptocurrency, and Tokenization: Legal Issues
Roger Royse390 visualizações
B12: AMLO | FinTech Situation in Thailand and Offshore and Money Laundering R... por Kullarat Phongsathaporn
B12: AMLO | FinTech Situation in Thailand and Offshore and Money Laundering R...B12: AMLO | FinTech Situation in Thailand and Offshore and Money Laundering R...
B12: AMLO | FinTech Situation in Thailand and Offshore and Money Laundering R...
Kullarat Phongsathaporn43 visualizações
DLT - AML & CFT - Risks & Opportunites por Philip Vasquez
DLT - AML & CFT - Risks & Opportunites DLT - AML & CFT - Risks & Opportunites
DLT - AML & CFT - Risks & Opportunites
Philip Vasquez218 visualizações
Bitcoin, Block Chain, Cryptocurrency and ICOs: A Legal Perspective por ideatoipo
Bitcoin, Block Chain, Cryptocurrency and ICOs: A Legal PerspectiveBitcoin, Block Chain, Cryptocurrency and ICOs: A Legal Perspective
Bitcoin, Block Chain, Cryptocurrency and ICOs: A Legal Perspective
ideatoipo249 visualizações
B11: Central IP & IT Court | FinTech: Legal and Regulatory Challenges (7 Aug ... por Kullarat Phongsathaporn
B11: Central IP & IT Court | FinTech: Legal and Regulatory Challenges (7 Aug ...B11: Central IP & IT Court | FinTech: Legal and Regulatory Challenges (7 Aug ...
B11: Central IP & IT Court | FinTech: Legal and Regulatory Challenges (7 Aug ...
Kullarat Phongsathaporn19 visualizações
CASE STUDY ON PKI & BIOMETRIC BASED APPLICATION por Pankaj Rane
CASE STUDY ON PKI & BIOMETRIC BASED APPLICATIONCASE STUDY ON PKI & BIOMETRIC BASED APPLICATION
CASE STUDY ON PKI & BIOMETRIC BASED APPLICATION
Pankaj Rane1.5K visualizações
SSI, TBDex Overview por AlexLewin7
SSI, TBDex Overview SSI, TBDex Overview
SSI, TBDex Overview
AlexLewin75 visualizações
Indjic fintech module 3 por Drago Indjic
Indjic fintech module 3Indjic fintech module 3
Indjic fintech module 3
Drago Indjic254 visualizações
Jan Keil - Identity and access management Facts. Challenges. Solution por Timetogrowup
Jan Keil - Identity and access management Facts. Challenges. SolutionJan Keil - Identity and access management Facts. Challenges. Solution
Jan Keil - Identity and access management Facts. Challenges. Solution
Timetogrowup496 visualizações
A4: Kasetsart University | FinTech and Contracts (2018) por Kullarat Phongsathaporn
A4: Kasetsart University | FinTech and Contracts (2018)A4: Kasetsart University | FinTech and Contracts (2018)
A4: Kasetsart University | FinTech and Contracts (2018)
Kullarat Phongsathaporn445 visualizações
Initio at World Blockchain & Cryptocurrency Summit 2018 por Initio
Initio at World Blockchain & Cryptocurrency Summit 2018Initio at World Blockchain & Cryptocurrency Summit 2018
Initio at World Blockchain & Cryptocurrency Summit 2018
Initio341 visualizações
Cscu module 08 securing online transactions por Alireza Ghahrood
Cscu module 08 securing online transactionsCscu module 08 securing online transactions
Cscu module 08 securing online transactions
Alireza Ghahrood44 visualizações
CPA - Introduction to Digital Identity - rev20171102 por Jean-François LOMBARDO
CPA - Introduction to Digital Identity - rev20171102CPA - Introduction to Digital Identity - rev20171102
CPA - Introduction to Digital Identity - rev20171102
Jean-François LOMBARDO112 visualizações
Kyc and Blockchain por Binu Yohannan
Kyc and BlockchainKyc and Blockchain
Kyc and Blockchain
Binu Yohannan732 visualizações
Future of identity - growing demand por Newsquare
Future of identity - growing demandFuture of identity - growing demand
Future of identity - growing demand
Newsquare142 visualizações
Data Con LA 2022 - Pre- recorded - Web3 and Decentralized Identity por Data Con LA
Data Con LA 2022 - Pre- recorded - Web3 and Decentralized IdentityData Con LA 2022 - Pre- recorded - Web3 and Decentralized Identity
Data Con LA 2022 - Pre- recorded - Web3 and Decentralized Identity
Data Con LA18 visualizações
IEEE Blockchain Summit Korea 2018 - Commercial Blockchain Application & Scala... por ICON Foundation
IEEE Blockchain Summit Korea 2018 - Commercial Blockchain Application & Scala...IEEE Blockchain Summit Korea 2018 - Commercial Blockchain Application & Scala...
IEEE Blockchain Summit Korea 2018 - Commercial Blockchain Application & Scala...
ICON Foundation71 visualizações

Último

OSMC 2023 | IGNITE: Metrics, Margins, Mutiny – How to make your SREs (not) ru... por
OSMC 2023 | IGNITE: Metrics, Margins, Mutiny – How to make your SREs (not) ru...OSMC 2023 | IGNITE: Metrics, Margins, Mutiny – How to make your SREs (not) ru...
OSMC 2023 | IGNITE: Metrics, Margins, Mutiny – How to make your SREs (not) ru...NETWAYS
7 visualizações20 slides
BLogSite (Web Programming) (1).pdf por
BLogSite (Web Programming) (1).pdfBLogSite (Web Programming) (1).pdf
BLogSite (Web Programming) (1).pdfFiverr
10 visualizações9 slides
Post-event report intro session-1.docx por
Post-event report intro session-1.docxPost-event report intro session-1.docx
Post-event report intro session-1.docxRohitRathi59
12 visualizações2 slides
Yin Sun - Shell por
Yin Sun - ShellYin Sun - Shell
Yin Sun - ShellDutch Power
6 visualizações17 slides
Roozbeh Torkzadeh - TU Eindhoven por
Roozbeh Torkzadeh - TU EindhovenRoozbeh Torkzadeh - TU Eindhoven
Roozbeh Torkzadeh - TU EindhovenDutch Power
6 visualizações14 slides
The Throne of Your Heart 11-26-23 PPT.pptx por
The Throne of Your Heart 11-26-23 PPT.pptxThe Throne of Your Heart 11-26-23 PPT.pptx
The Throne of Your Heart 11-26-23 PPT.pptxFamilyWorshipCenterD
5 visualizações24 slides

Último(20)

OSMC 2023 | IGNITE: Metrics, Margins, Mutiny – How to make your SREs (not) ru... por NETWAYS
OSMC 2023 | IGNITE: Metrics, Margins, Mutiny – How to make your SREs (not) ru...OSMC 2023 | IGNITE: Metrics, Margins, Mutiny – How to make your SREs (not) ru...
OSMC 2023 | IGNITE: Metrics, Margins, Mutiny – How to make your SREs (not) ru...
NETWAYS7 visualizações
BLogSite (Web Programming) (1).pdf por Fiverr
BLogSite (Web Programming) (1).pdfBLogSite (Web Programming) (1).pdf
BLogSite (Web Programming) (1).pdf
Fiverr10 visualizações
Post-event report intro session-1.docx por RohitRathi59
Post-event report intro session-1.docxPost-event report intro session-1.docx
Post-event report intro session-1.docx
RohitRathi5912 visualizações
Yin Sun - Shell por Dutch Power
Yin Sun - ShellYin Sun - Shell
Yin Sun - Shell
Dutch Power6 visualizações
Roozbeh Torkzadeh - TU Eindhoven por Dutch Power
Roozbeh Torkzadeh - TU EindhovenRoozbeh Torkzadeh - TU Eindhoven
Roozbeh Torkzadeh - TU Eindhoven
Dutch Power6 visualizações
The Throne of Your Heart 11-26-23 PPT.pptx por FamilyWorshipCenterD
The Throne of Your Heart 11-26-23 PPT.pptxThe Throne of Your Heart 11-26-23 PPT.pptx
The Throne of Your Heart 11-26-23 PPT.pptx
FamilyWorshipCenterD5 visualizações
OSMC 2023 | Know your data: The stats behind your alerts by Dave McAllister por NETWAYS
OSMC 2023 | Know your data: The stats behind your alerts by Dave McAllisterOSMC 2023 | Know your data: The stats behind your alerts by Dave McAllister
OSMC 2023 | Know your data: The stats behind your alerts by Dave McAllister
NETWAYS9 visualizações
Speaking with confidence-converted.pdf por Abdul salam
Speaking with confidence-converted.pdfSpeaking with confidence-converted.pdf
Speaking with confidence-converted.pdf
Abdul salam 16 visualizações
SOA PPT ON SEA TURTLES.pptx por EuniceOseiYeboah
SOA PPT ON SEA TURTLES.pptxSOA PPT ON SEA TURTLES.pptx
SOA PPT ON SEA TURTLES.pptx
EuniceOseiYeboah9 visualizações
OSMC 2023 | IGNITE: Serving Server-Side WASM with Web Awareness with NGINX Un... por NETWAYS
OSMC 2023 | IGNITE: Serving Server-Side WASM with Web Awareness with NGINX Un...OSMC 2023 | IGNITE: Serving Server-Side WASM with Web Awareness with NGINX Un...
OSMC 2023 | IGNITE: Serving Server-Side WASM with Web Awareness with NGINX Un...
NETWAYS11 visualizações
falsettos por RenzoCalandra
falsettosfalsettos
falsettos
RenzoCalandra5 visualizações
OSMC 2023 | Icinga for Windows – Age of PowerShell by Christian Stein por NETWAYS
OSMC 2023 | Icinga for Windows – Age of PowerShell by Christian SteinOSMC 2023 | Icinga for Windows – Age of PowerShell by Christian Stein
OSMC 2023 | Icinga for Windows – Age of PowerShell by Christian Stein
NETWAYS8 visualizações
OSMC | SNMP Monitoring at scale by Rocco Pezzani & Thomas Gelf por NETWAYS
OSMC | SNMP Monitoring at scale by Rocco Pezzani & Thomas Gelf OSMC | SNMP Monitoring at scale by Rocco Pezzani & Thomas Gelf
OSMC | SNMP Monitoring at scale by Rocco Pezzani & Thomas Gelf
NETWAYS10 visualizações
CitSciOz MOUA Inspiring Change Through Art por Christian Bartens
CitSciOz MOUA Inspiring Change Through ArtCitSciOz MOUA Inspiring Change Through Art
CitSciOz MOUA Inspiring Change Through Art
Christian Bartens42 visualizações
Thanks Giving Encouragement Wednesday.pptx por FamilyWorshipCenterD
Thanks Giving Encouragement Wednesday.pptxThanks Giving Encouragement Wednesday.pptx
Thanks Giving Encouragement Wednesday.pptx
FamilyWorshipCenterD10 visualizações
Helko van den Brom - VSL por Dutch Power
Helko van den Brom - VSLHelko van den Brom - VSL
Helko van den Brom - VSL
Dutch Power7 visualizações
New Microsoft Word Document.docx por apomahendranagarmudd
New Microsoft Word Document.docxNew Microsoft Word Document.docx
New Microsoft Word Document.docx
apomahendranagarmudd7 visualizações
Christan van Dorst - Hyteps por Dutch Power
Christan van Dorst - HytepsChristan van Dorst - Hyteps
Christan van Dorst - Hyteps
Dutch Power6 visualizações

Payments and AML CFT KYC

  • 1. 1 1iSignthis © 2015 iSignthis Ltd (ASX : ISX ) Transactions Drive e-Identity: Payments and AML/CTF KYC MODERATOR: Hue Dang, CAMS Head of Asia, ACAMS Jointly Presented by: Managing Director John Karantzis B.E., LL.M, M.Ent, FIEAust Director Scott W Minehane B.Econ LL.B., LL.M
  • 2. 2 What drives the need for e- Identity? Transactions! People are identified when they want to do something…….. Buy, sell, trade, receive goods and services. The internet means we need to adapt to how we approach identity. Regulated (online) transactions are subject to: •  Financial Identity (KYC) •  Privacy / Data Protection law •  Doing things well reduces compliance costs and enhances the customer experience
  • 3. 3 Today’s Presentation 1.  Identity? What is it? 2.  Regulatory Approaches to Identity i.  European Union ii.  South Korea iii.  Hong Kong iv.  Singapore v.  Australia 3.  Private Sector – Who needs identity? 4.  How do we establish identity? a.  Physical Documents b.  Static Electronic Verification c.  Dynamic Electronic Verification 5.  Conclusions
  • 4. 4 1. What is Identity A lawful or legally standing association, corporation, partnership, proprietorship, trust, or individual. Has legal capacity to: •  enter into agreements or contracts, •  assume obligations, •  incur and pay debts, •  sue and be sued in its own right, and •  to be accountable for illegal activities.
  • 5. 5 1a. What is Digital Identity? •  Lets look at how Privacy law treats identity: •  In the US, the law provides multiple definitions of Personally Identifiable Information (PII), most focusing on whether the information pertains to an (already) identified person. •  By way of contrast, in the EU, there is a single definition of personal data to encompass all information identifiable to a person. •  The E.U. Data Protection Directive defines “an identifiable” person as “one who can be identified, directly, or indirectly, in particular by reference to an identification number or to one or more factors specific to his physical, physiological, mental, economic, cultural, or social identity.”
  • 6. 6 2. Regulatory approaches to identity 1.  “Specific Type Approach” : Regulations specifically state the means or what must be done 2.  “Non Public Approach” : regulations seek to make use of information that is not in the public domain to identify a person 3.  “Principles Based Approach” :State the outcome rather than the means. The means may include elements of Specific Type and Non Public, as well as other means. 4.  FATF ‘risk based approach’ favours move towards ‘Principles based Approach’.
  • 7. 7 Guiding Principle for FATF legislative model jurisdictions “Customer due diligence measures shall comprise: Identifying the customer and verifying the customer's identity on the basis of documents, data or information obtained from a reliable and independent source;” 2a. FATF Recommendations #5 (Principles Based Approach)
  • 8. 8 Consider the following factors with regards to data •  (a) its accuracy; •  (b) how secure it is; •  (c) how the data is kept up-to-date / its recency •  (d) how comprehensive the data is •  (e) whether the data is maintained by a government body or pursuant to legislation; and •  (f) whether the electronic data can be additionally authenticated 2b. What is a reliable source of data?
  • 9. 9 2 (i). ’Identifying’ the customer (EU) •  In the EU, any “unique” attribute is sufficient to identify a person (Principle based) •  However, EU all member states require verification of name + address (UK, IRL, SE) •  Some states require verification of age as well : name + address + age (Eg FR, IT and BG).
  • 10. 10 South Korea’s Article 38 (of 2010 AMLCTF Regs) takes a specific approach. Identifying a customer is defined as : •  name, •  Address, •  identity or travel document incl. number and type If not a Korean Citizen, also require •  date of birth •  nationality, 2 (ii). ’Identifying’ the customer (KOR)
  • 11. 11 Article 35 (Non face-to-face transactions) (1) Financial institutions shall establish policies and procedures to address the risk of ML/TF related to non-face-to-face transactions. 2 (ii). Remote ’Verifying’ the customer (KOR)
  • 12. 12 2 (ii). ’Identifying’ the customer (HKG) Hong Kong takes a specific approach via the Guidance Note GN33 (March 2015), similar to South Korea’s Article 38 Identifying a customer is defined as : •  name, •  Address, •  date of birth •  nationality •  identity or travel document incl. number and type
  • 13. 13 FI must carry out at least one of the following measures for remote on-boarding: a.  Use additional sources of documents, data or information b.  taking supplementary measures to verify all the information provided by the customer; c.  ensuring that the first payment made into the customer’s account is received from an account in the customer’s name with an authorized institution in an equivalent jurisdiction…… 2 (iii). Remote ‘Verifying’ the customer (HKG)
  • 14. 14 2 (iv). Remote ‘Verifying’ the customer (SGP) MAS 626 (New Guidelines 24 April 2015) –Appropriate measures to address risks arising from undertaking transactions via internet, by using one or more of: (a) Independent telephone verification of customer; (b) confirmation of the customer’s address; (c) confirmation of the customer’s employment status; (d) customer’s salary confirmation by use of recent bank statements from another bank; (e) qualified 3rd party certification of identification documents (f) requiring the first payment to be carried out through an account in the customer’s name with another FI subject to similar or equivalent customer due diligence standards;
  • 15. 15 The reporting entity must collect and verify the following KYC information: i.  the customer’s full name; and Collect both of, but verify either /any one of : a.  the customer’s date of birth, or b.  the customer’s residential address. 2 (iv). ’Identifying’ and ‘Verifying’ the customer (AUS)
  • 16. 16 0 1 2 3 4 5 6 7 AUS/UK/US/SE IT/FR/BG KOR HKG SGP Name + Address Or Name + DoB Name + Address+ DoB Name + Address+ DoB + Nationality + GovID + [SGP] Contact Details 2(v). Summary : # of Attributes to be Verified.
  • 17. 17 3. Private Sector: Who needs Identity? •  Payment processors : compliance requirement for AML KYC & /or ECB SecuRE Pay. •  eMerchants in the SEPA/EU28 as part of the ECB’s Strong Customer Authentication. •  Stock Brokers •  Financial Systems requiring two factor authentication technology •  Banks (incl debit, card issuers) •  Commodity/Bullion Brokers •  Crypto Currency Exchanges (e.g. bitcoin) •  Real Estate Sales/Rental Agents •  Travel Agents (US Patriot Act) •  Life Insurers •  Accountants/Auditors/Lawyers •  Financial Advisors/Super Funds •  eWallets/mWallet Providers •  Money remittance p2p •  Loan/Pawn Providers •  eCasino/eGaming/eWagering •  Any business routinely trading > US $10k/transaction •  Currency Exchange Payment Processing Financial Professional Services Others
  • 18. 18 Customer Ease Lower Cost LOCAL AUTOMATED MANUAL Notarised: posted/uploaded documents* ‘Experian’ or ‘GBGroup’ style static, credit database search (UK, US, AU) Face to face checks iSignthis + PayPal GLOBAL •  No dynamic means to include customer on request if not already a historic customer of a credit reporting agency. •  Requires cross check of other databases. •  Typical coverage of 60% of online applicants •  >3Bn accessible global payment instruments. •  No need for user’s disclosure of bank details to a third party. Lower Friction Remote on boarding 3. Private Sector: Who needs Identity?
  • 19. 19 Two ways: (i) Face to Face– from reliable document sources, normally using government issued photo identity documents. Typically, we look for; •  Proof of Identity (POI) – birth certificate, marriage certificate •  Evidence of Identity (EOI) – government issued ID or bank accounts/cards •  Social Footprint – utility bills, payments, insurances (ii) Electronic Verification (EV) – from reliable data or information sources 4. How do we establish identity?
  • 20. 20 The EU’s Public Register of Authentic Identity and Travel Documents Online (PRADO), recommends: “When checking security features of documents: FEEL, LOOK, TILT!” And “Check the validity of document numbers – [via] List of links to websites with information on invalid document numbers” http://prado.consilium.europa.eu 4a (i). Approach 1 – Physical Documents (Challenges – Authenticity, Validity, Transformation, Verification) en.wikipedia.org/wiki/European_driving_licence
  • 21. 21 4a (i). Transforming – Physical Documents (Challenges – Authenticity, Validity, Transformation, Verification) •  Trend in some countries towards using Webcams or non-Certified images. •  Scanners/Webcams – can’t look, feel tilt ; so, how valid, “reliable” or “independent is uploading of an identity document(s)? •  How reliable is a comparison of a photo on such a document via webcam? •  There is no EU or global register of stolen credentials…how is validity of these documents checked? •  Can a document be transitioned from physical to become “data” or information without verification as to its reliability or validity by issuer?
  • 22. 22 Is there a legal basis to rely upon non issuer/third party transformed physical documents? •  NO! This approach is specifically prohibited or not endorsed by regulators in many jurisdictions: •  Eg, Germany (legislation), HKG (GN33 @ 4.12.2), Singapore (MAS Guidance Note @ 33), Australia (AML Regs), Korea (Original or certified, Per AMLCTF Reg 39), UK (AML2007, 14(2)(c)), Canada (Schedule 7) •  We could not find direct support in any EU, Australian or Asia AML/CTF regulation that supports the concept of digital transformation of documents to data as constituting a reliable source of data – unless a qualified person certifies the document 4a (ii). Transforming – Physical Documents
  • 23. 23 Breach Size 80m , Jan 15 Breach Size 1m , Nov 14 Static database – electoral, credit, passport, drivers license Relies on “Non Public Approach” Knowledge Based Authentication (KBA) – comparison of collected data to database. Issues •  Highly localised, no global approach •  Much of the data is public or easily obtained. •  No revocation means if say wallet stolen or mailbox compromised •  Data may not change between KBA making ongoing due diligence risible susceptible to ghosting and/or takeover •  Simple to ‘reverse or social engineer’ the KBA •  Once breached, re-credentialing of individuals is difficult – data becomes “public” – what now? 4a (ii). Approach 2: Static Database Electronic Verification (Non Public Approach)
  • 24. 24 Physical Identification Proof of Identity Documents E- Payment Account Accounts Unique Regulated AML (Identifies Person) Verify Account Once verified - “Reliable” Source for EV (AML) KYC Identity Sanction Screen + Monitor Validate data Secondary Sources of Data 150m people 200 countries 4C. Approach 3: Dynamic Re-Use of Bank ID (Principles based)
  • 25. 25 25 Direct Account Access 1.  Request account login details from customer 2.  Service Provider Accesses account 3.  SP Confirms account is active and retrieve details associated with account Key Risk : requires customer to provide Sensitive Account Data (login details + Password) Key Limitation : limited to 350m bank accounts, mainly in SEPA. No credit card support. Global – legal, risk, liability issues? Indirect Account Access via KBA 1.  Service Provider creates a “secret” using payment against payment instrument and Process secret to a statement of account 2.  Ask customer to retrieve secret from payment instrument “secure area” Key advantages : i)  Customer Sensitive Account Data not exposed to 3rd party ii)  Global : Leverages more than 3.5Bn cards and bank accounts across 200 countries iii)  Risks reduced for all parties incl operator liability under eIDAS for data breach 4C (i). Approach 3: Dynamic Electronic Verification
  • 26. 26 26 4C (ii). KBA Example: iSignthis & PayPal
  • 27. 27 Payment Data (Merchant, Acquirer, Card Details, Name, Amount, Time, Place, IIN Data + Country of issue) Authentication + Validation Data (Geodata, device data, SAD, phone number, SMS) Device Data (MAC, IMEI, CPE, Language, OS) Network Data : IP Address, Carrier, Channel, route, Cell Tower Delivery Data Address, Phone Under EU law, all of this is PII – identifiable to a person Under US law, taken as a whole, this is also PII – identifies a person. 4C (iii). Advantages of Transactional Approach: Metadata is the DNA of a payment message
  • 28. 28 Link Identity & Payment Account with 2FA First Factor: User selected Passcode Second Factor: One Time Password by SMS Or Assurity(.sg) hard token iSignthis Identity : AML/CTF KYC Identity traced & linked to 2FA and/or Identity file created Customer transacts with eMerchant Online or mobile Customer iSignthis process takes place post cart checkout, ensuring high conversion rates. 4c (iv). A reliable means to generate identity on demand
  • 29. 29 Passporting: •  Country <> Country •  AML Service <> AML Service •  AML Service <>Government Possible in most jurisdictions provided that source is from an equivalency jurisdiction – not necessarily FATF. 5. Global application- Passporting
  • 30. 30 •  Transactions drive e-identity. And ought do so – ‘pre- boarding’ is an outmoded concept for online, and On- boarding customers for the sake of doing so is expensive and unnecessary. •  Identity is complex. Legally establishing identity is even more complex. •  Ultimately given its importance to ecommerce a scalable, dynamic electronic verification approach to identity is important taking into account security, costs and the user experience •  Global opportunities via passporting approach. •  Documents are not data unless transformed by a qualified certifying party. Key Takeaways
  • 31. 31 Sales: Andrew Karantzis andrew.karantzis@isignthis.com +61 411 428 259 For further information contact: