RBI, SEBI, UIDAI and IRDAI tend to update their KYC mandate overtime and considering how official circulars are written most of us require the help of a legal expert to understand and interpret the changes and regulations that might affect you as an enterprise registered and regulated by one of these entities. We spoke to our team of legal experts to help us understand what these mean and in this series we try to demystify each of these regulations for you. In our first chapter we try to interpret the most recent of these KYC mandates, this one by RBI. We would, to being with cover the major highlights of the RBI master circular on KYC here. here we go, The Reserve Bank
RBI's latest amendment of master directive on KYC, allowed regulated entities including banks to use offline Aadhaar for identifying and verifying their customers as required by PMLA act. This meant all private sector companies that had lost, an easy to use method of KYCing with eKYC, can now use Offline Aadhaar which is very similar to ekYC to KYC their customers. In this article we try to figure out what Offline KYC is and how it could be much better than eKYC. To begin with let us fist understand, what eKYC and Offline Aadhaar KYC are? Here we go, KYC or Know your customer, simply put is the process of identifying a customer with a goal of detecting and avoiding fraud in financial transactions,
Aadhaar, apart from being India's unique identity program was also responsible for changing the way how people looked at digital identity. The supreme court verdict on Aadhaar limited access of Aadhaar data by private companies and lead 2 drastic changes in the market, BFSI and other industries which relied on eKYC to verify and identify their customers, lost access to an inexpensive and fast KYC process Lead to the emergence of identity service providers who digitised the paper & plastic OVD's to streamline the use of ID cards for KYC Companies like Yoti and Veri5Digital entered the market to simplify how users shared their data and how service providers gained access to it while being completely compliant to the new data
Know your customer, alternatively known as know your client or simply KYC, is the process of a business verifying the identity of its clients and assessing their suitability, along with the potential risks of illegal intentions towards the business relationship. - Wikipedia The government of India enacted Prevention of Money Laundering Act, in 2003 with an objective of preventing and control money laundering by antisocial elements. Under this act RBI mandated all financial institutions under it to make sure that they knew who they were providing the services to, this process is called KYC (know your customer). IRDA, SEBI followed suite and mandated KYC for the entities that come under their regulation. The primary reason why this is required is prevention of fraud, money laundering and
2018 was eventful! A quick Google or DuckDuckGo search would reveals more than 20 times in 2018, when a million users or more of a website, or a service or an app got their private information stolen. And that are the ones that we know of. In a world where everything is connected to everything else and where social media companies, search giants and governments are more than ever, keen to gather as much data about you, as possible, Privacy has become more important than ever. The best way to protect your privacy is to be completely off of the internet, having said that it's not a solution that can be implemented. Internet has bought us more good than bad and staying
Gone are those days where all office data were stored externally in hard disks CDs etc, Today, most of the organization’s work is done in the cloud with multiple devices, which means the data can be accessed from anywhere by the company personnel. Now the real problem arises here! What if someone else who doesn’t even belong to the organization accesses it? The thought itself would horrify some! So, to prevent this we have to come up with new ways to manage the employees’ identity so that only the right person will have access to the data. But adding too much security measures will smother the productivity. So, to find the right balance with security and productivity Identity and Access Management
When we started Aadhaar Bridge in 2015, the small team at Khosla Labs had one singular goal - to make it easier for companies to use Aadhaar API’s for their identity and on boarding needs, while staying 100% compliant with all regulations and guidelines. Over the course of our growth, we served more than 250 clients across industries while expanding our portfolio of products to include Video ID KYC, eSign, eNACH, AUA/KUA Hosting, Aadhaar Vault among others. As we expanded our products and services from being Aadhaar focussed to broader set of Digital India products and services such as eNACH,Video ID KYC, eSign (and many more to be launched), we wanted our new name to reflect this broader agenda, hence the new
Irrespective who you are, if you own an email id, have Facebook, Instagram or Google Plus account; you have an online profile, a web based personality. And if you are online chances are companies and organisations, government or otherwise have tracked your behaviour and have kept extensive records. Online, your persona is built by combining two interrelated sources of information Your online behaviour tracked by a machine And the personal data that you choose to share The data that machine tracks includes your purchase history, content that you read, data usage times, internet access times, URL's visited, device location and everything that involves you connecting to the web or using a device connected to the web. While the information that you share includes your birthday, name,
On 2nd March, 2019, the President of India vide the office of Ministry of Law and Justice notified the Aadhaar and Other Laws (Amendment) Ordinance, 2019 (“Ordinance”). The Ordinance proposes the same amendments as those contained in the Aadhaar Bill, 2018, which had been passed in the Lok Sabha this January. Most importantly, despite deleting section 57, the Ordinance re-introduces private sector use of the Aadhaar infrastructure through amendments to the Telegraph Act and the Prevention of Money Laundering Act. In this article we try to demystify what this ordinance says and what it means for us, Aadhaar ecosystem has been defined: Aadhaar ecosystem has been defined by the Ordinance and the same classifies offline verification seeking entities and any other entity or
One of the best things about Aadhaar API was its ability to allow organisations like Banks and other financial institutions to instantly verify the identity of the customer, as required by RBI regulations. This meant new accounts and loan disbursements could be done almost instantly and with minimum to no human intervention. With the Supreme court’s verdict private institutions were barred from using Aadhaar APIs in September of 2018. Though with it’s latest ordinance Government of India now has allowed Banks and Telecom companies to use the API’s for user verification. With the APIs being back we thought it was the right time to help your developers understand how they could use the documentation that they got from UIDAI to integrate
KYC or Know your customer, simply put is the process of identifying a customer with a goal of detecting and avoiding fraud in financial transactions, as such it is legally binding to financial institutions including banks and NBFC’s. Read more on What is KYC? Why is it important? eKYC is when KYC is done electronically. With respect to Aadhaar, eKYC is defined as A paperless Know Your Customer (KYC) procedure, wherein the identity and address of the user are verified electronically through Aadhaar authentication. UIDAI built eKYC with a goal of simplifying customer acquisition and processing, especially in the wake of Indian governments digital India initiative, eKYC played a vital role helping poor get bank accounts and access to credit when required. With the explicit
“They who can give up essential liberty to obtain a little temporary safety deserve neither liberty nor safety.” ― Benjamin Franklin, Memoirs of the life & writings of Benjamin Franklin What Benjamin Franklin meant by those words is debatable, though the fact remains that for much of history, humanity has traded off privacy for its need for survival, luxury or safety. Privacy was first pioneered by saints and yogis of the past. They devised the way of isolation, where they secluded themselves from the world to achieve inner peace and ultimately, nirvana. Privacy was always an outcome rather than a way of being. In some communities in North America and Africa a desire for privacy is viewed to be profoundly rude. Privacy is “a state
Running lending companies in India has it s own problem. Starting one shouldn't be one of them. In this article we try to list down 3 things that you as a Lending company founder should consider before you start the business.
Aadhaar has been in use for quite some time, especially the debate around how it may allow government to monitor its citizens. Having said that Aadhaar Card was not the only identity card that tried to consolidate all the citizens of this country into a single exhaustible database. In the infographic , The Indian history of Identity, we try to highlight some of the major milestones w.r.t identity in India.