Download as pdf or txt
Download as pdf or txt
You are on page 1of 22

KYC models

Ragnar Toomla
TalTech / SEB
Landscape

Customer Financial institution Regulator

 Multiple and duplicated  Increasing KYC costs  Difficult to oversee


information requests and  Data quality individual FI approaches and
points of contact  Changing regulatory targets processes
 Long onboarding process  Risks of KYC failure  Complex international
 Time consuming renewals standards
 Scrutiny by regulators
 Recent top tier banks’ KYC
 Sub-optimal customer failures
experience

Source: PWC
Financial crime becoming more sophisticated
De-risking trend

 FI’s opting to exit entire categories of  May lead banks to outlaw entire lawful
customers industries
 Whole segments of consumers and
entire product lines are being  Could force some of these entities and
abandoned individuals to turn to service providers
 Safer to avoid high-risk clients with limited AML capabilities or to the
altogether than to manage the shadow banking system
associated compliance costs

In order to help ensure the future health and security of the financial system, it will be
imperative for all players to work together
Typical customer on-boarding process

Application Verification Collection Management

Source: Study on eID and digital on-boarding: mapping and analysis of existing on-boarding bank practices across the EU, 2018.
Example process in case of shared KYC utility

Customer Bank queries Validation with Data is


approaches the shared KYC trusted updated in
bank platform sources shared KYC KYC process
•Individual •Customer consent •Government platform can be
•Corporate to access data registries •Info from completed
•Tax authorities validation process
•Credit bureaus is updated on
shared platform

Source: Infocomm Media Development Authority of Singapore (IMDA). 2017


KYC utilities

Industry Utility Service Self-Sovereign


Jurisdictional
Collaboration Providers Digital Identities

Utility Services Managed Services


data services and outsourced utility services,
identification (ID) plus transaction tracking and
information storage CDD

Source: Adl and Haworth 2018; Sengupta 2017


Industry
The SWIFT KYC Registry Collaboration
A single source to share & collect your KYC data for Correspondent Banking

Standardized baseline
Extensive information including legal entity data, ownership,
client and product segments, detailed AML questionnaire,
tax/FATCA/CRS information

Up-to-date information
Time-stamped data. Any changes are communicated in real-
time to correspondents

Data verification by SWIFT


All data verified by SWIFT compliance professionals

Cooperative business model


Unlimited number of users, volume-based pricing
and guaranteed maximum spend

5500
banks 60% coverage in terms of SWIFT-connected banks Secure, user-control access
registered 75% coverage in terms of SWIFT transactions volume User Approved sharing of KYC data

Correspondent Banking Suite – October 2017


9
Industry
SWIFT KYC registry for corporates Collaboration
Managed Services
D.KYC (Deloitte Know Your Customer) outsourced utility services,
plus transaction tracking and
CDD

About Features

 Launched in 2018  Counterparty onboarding - Initial risk scoring and


 Provided by Deloitte Luxembourg due diligence
 Ongoing monitoring and due diligence
 Integrated managed service that  Watchlist and adverse media screening
combines numerous KYC/AML/CTF  Documents verification/qualification
services, expertise, and workflow  Oversight & Reporting
management.
 Data hosted in Luxembourg
D.KYC operating model
Jurisdictional
Singapore MyInfo Personal Data Platform

Source: https://www.slideshare.net/ISS-NUS/myinfo-product-journey-govtech-Singapore
Consent based data sharing Jurisdictional

Source: https://www.slideshare.net/ISS-NUS/myinfo-product-journey-govtech-Singapore
Jurisdictional
Streamlining private sector services

Source: https://www.slideshare.net/ISS-NUS/myinfo-product-journey-govtech-Singapore
Design desicions
1. Mutualisation - one single KYC record
2. Centralisation not decentralisation
3. Exclusion of private individuals and private
banking
4. Harmonised policy and operating model
5. Customer interaction by bank not Utility
6. Ownership model - separate company, with
independent management. Banks will not have
any ownership.
7. Adoption strategy
• ensuring ecosystem connectivity with other data sources
• ensuring the ability to ingest and output many different types of
data formats
• exploring ways to increase adoption rate of the Utility, e.g.
regulators mandating the use of the Utility
Self-Sovereign
Evolution of digital identities Digital Identities

User- Self-
Centralized Federated
centric sovereign
Identity Identity
Identity identities

Identity is centrally Usage of multiple Focusing on the Every person creates


assigned by authority services with a control of personal and manages their
single account data by the user own digital identities

Ex: Assigning IP Ex: Microsoft Ex: OpenID, Oauth, Ex:ID2020


addresses in early Passport Facebook Connect
90s by IANA

Source: Allen 2016


Self-Sovereign
Ten Principles of Self-Sovereign Identity Digital Identities

1. Existence. Users must have an independent existence.


2. Control. Users must control their identities.
3. Access. Users must have access to their own data.
4. Transparency. Systems and algorithms must be transparent.
5. Persistence. Identities must be long-lived.
6. Portability. Information and services about identity must be
transportable.
7. Interoperability. Identities should be as widely usable as possible.
8. Consent. Users must agree to the use of their identity.
9. Minimalization. Disclosure of claims must be minimized.
10.Protection. The rights of users must be protected.

Source: Allen 2016


Self-Sovereign
Self-Sovereign Identity model Digital Identities

Source: Ankur Patel, Principal Program Manager, Identity, Microsoft 2019


Self-Sovereign
Opportunities Challenges Digital Identities

 person ultimately has full control  challenge to offer solutions that help persons to
 increases the freedom of the individual manage the additional administrative efforts
 trustworthiness no longer directly tied to local sufficiently comfortable
governments  protection of the privacy of persons
 protection of privacy as an important design  difficulty of prohibiting profiling by third parties
objective (GDPR)  data formats and standardized interfaces for
 selective sharing of personal data with service securely exchanging evidences and digital
providers follows the idea of data economy and identities
privacy by default/design  distributed ledger technologies have limitations in
 transparency created by self-governance could terms of speed and volume
also strengthen the European digital single
market by removing barriers of missing trust
Conclusion

• Less corruption, tax evasion, money laundering, and other


criminal activities
• More consistent information
• Better information management
• Reduced risks
• Cheaper and easier to create new relationships

You might also like