AuthBridge-footer-logo
authbridge

Officially Valid Documents: Main Features

An “Officially Valid Document”, defined in Rule 2(d) of the Prevention of Money Laundering (Maintenance of Records) Rules, 2005, means the Passport, the Driving Licence, proof of possession of Aadhaar number, the Voter’s Identity Card issued by the Election Commission of India, the job card issued by NREGA duly signed by an officer of the State Government, the letter issued by the Unique Identification Authority of India or the National Population Register containing details of name, address and Aadhaar number, or any other document as notified by the Central Government in consultation with the Regulator.

Where simplified measures are applied to verify identity, the following are also deemed docs:

  • Identity card with applicant’s photograph issued by Central/State Government Departments, statutory/regulatory authorities, PSUs, scheduled commercial banks, and public financial institutions.
  • A letter issued by a gazetted officer, with a duly attested photograph of the person.

Where simplified measures are applied for the limited purpose of proof of address and a prospective customer is unable to produce any evidence of address, the following are deemed docs:

  • Utility bills (electricity, telephone, post-paid mobile, piped gas, water) are not over two months old.
  • Property or municipal tax receipt.
  • Bank account or Post Office savings bank account statement (or, if the reporting entity is in an IFSC, a foreign bank statement).
  • Pension or family pension payment orders (PPOs) issued to retired employees by Government Departments or PSUs, if they contain the address.
  • Letter of allotment of accommodation from employers in the public sector (and similar bodies) or leave-and-licence agreements with such employers.

These address relaxations are for a limited purpose and do not replace the obligation to maintain current KYC.

  • If the document presented by a foreign national does not contain an address, documents issued by the Government departments of those foreign jurisdictions and letters from a Foreign Embassy or Mission in India are acceptable as proof of address.
  • In an International Financial Services Centre (IFSC), the national identity card and voter identification card issued by foreign jurisdictions (or their authorised agencies), capturing the photograph, name, date of birth and address of a foreign national, are also considered valid.

A client may submit proof of possession of an Aadhaar number as a valid doc using the form issued by UIDAI (physical or approved electronic forms).

The document remains valid even if the name has changed after issuance, provided the change is supported by a marriage certificate issued by the State Government or a Gazette notification indicating the change of name. Offline verification has the same meaning as in the Aadhaar Act; it enables identity verification without online authentication, consistent with the Act’s definition and modalities permitted thereunder. Politically Exposed Persons (PEPs) are individuals entrusted with prominent public functions by a foreign country (e.g., heads of state/government, senior politicians, senior government/judicial/military officers, senior executives of state-owned corporations, and key political party officials). The PEP classification affects customer risk categorisation and is used alongside document-based identification during onboarding and ongoing due diligence.

It is important to note that these docs serve identity and address; separate documents are not required if the document address is current. For non-individual clients (companies, partnerships, trusts), entity documents are required in addition to documents of natural persons who are beneficial owners, authorised signatories or controllers.

Year-IN-Review-blog-image

AuthBridge’s Year In Review 2024: Key Highlights

As we step into 2025, it’s the perfect moment for us to reflect on 2024—a year of transformative growth, innovation, and progress for AuthBridge. From achieving remarkable milestones to unveiling new initiatives, 2024 was an important chapter in our journey of building trust through technology. Here’s a look back at the highlights that shaped our year.

19 Years Of Trust

AuthBridge 19 Years

In August 2024, we proudly celebrated 19 years of redefining trust in identity verification and risk management. This milestone solidifies our unwavering commitment to empowering businesses with reliable, secure, tech-driven solutions. Over the years, AuthBridge has not only set industry benchmarks but also become synonymous with quality and innovation.

Expanding Our Digital Presence

AuthBridge Recap 2024 Social media

Crossing 100,000 Followers on LinkedIn

This year marked a proud milestone for AuthBridge as our LinkedIn community surpassed 100,000 followers, solidifying our standing as thought leaders in the industry. Through consistent sharing of insights, case studies, and innovations, we have cultivated a community of professionals who value trusted expertise. If you haven’t checked us out on LinkedIn yet, click on this link and join our ever-growing community.

Expanding On New Social Media Platforms

In 2024, AuthBridge went live on the popular social media platform: Instagram, engaging with a new audience. We also saw growth on our YouTube channel, with new product videos and insightful webinars. These platforms allow us to connect meaningfully, delivering value through diverse content formats like videos, reels, and in-depth guides.
You can click on this link to follow us on Instagram and also subscribe to our YouTube channel by clicking on this link here.

Pursuing Perfection With Continuous Product Innovations

AuthBridge Recap 2024 Product

Innovation remained at the heart of AuthBridge in 2024, with our talented Product team at the core of adding significant and much-needed enhancements across our products. Here is a small recap of some of the key updates that a few of our products received in 2024:

  • SignDrive: Introduced auto-signing capabilities and vernacular language support, making e-signatures accessible and seamless.
  • iBridge: Added real-time insufficiency tracking and DigiLocker integration, cutting verification TAT dramatically.
  • OnboardX: Introduced high-risk vendor watchlists and dynamic dashboards, enabling smarter and more secure vendor management.
  • TruthScreen: Enhanced verification processes with advanced Mega PAN features and faster OCR technology, setting new benchmarks in speed and accuracy.

Annual Trend Report 2024: Exclusive Industry Insights

ATR Recap 2024

We released our much-anticipated Annual Trend Report 2024 which delivered data-driven insights from over 20 million verifications. Key findings from the ATR included:

  • 44% Surge in Employment Discrepancies: Highlighting the critical need for robust background checks.
  • Sector-Specific Challenges: Verification discrepancies peaked in the telecom, BFSI, and pharma sectors.
  • Gig Economy Risks: Several gig workers with wrong credentials were flagged for moonlighting, emphasising the importance of stringent screening.

The report also explored AI’s significant impact on verification, reaffirming our commitment to equipping businesses with actionable, forward-looking insights. To get all the details and insights around our findings, download the ATR by clicking on this link here.

AuthBridge In The Spotlight

AuthBridge media 2024

In 2024, our CEO Ajay Trehan and AuthBridge were featured in leading publications in the country like The Economic Times, Business Standard, and Mint. These features showcased:

These recognitions amplified our industry influence and are a testimonial to the confirmation of our dedication to addressing emerging and critical business challenges.

What To Expect In 2025?

Authbridge 2025 what to expect

As we embrace 2025, our commitment remains unwavering: leveraging cutting-edge technology to redefine trust solutions. From enhancing customer experiences to addressing evolving business risks, we are poised to continue setting new benchmarks in the industry.

With your trust and partnership, we are excited to explore new opportunities and make 2025 a year of even greater impact. Thank you for being a part of our journey and for your unwavering support so far. Stay connected with us to discover the exciting innovations and updates AuthBridge has in store for 2025!

What is Blue collar crime?

What Is Blue-Collar Crime? Meaning, Types and Impact

Understanding Blue-Collar Crime

Corporate fraud and financial scams might come to mind when we think about crimes affecting businesses. But there’s another side to this issue that doesn’t get enough attention—Blue-collar crime. These are crimes typically committed by workers involved in manual or physical jobs, like factory labourers, delivery drivers, or construction workers. They include offences like theft, assault, property damage, and even drug-related activities.

This is especially important in India because a large part of our workforce belongs to the blue-collar segment. These individuals are crucial to our economy, from delivery partners in booming e-commerce businesses to construction workers building our cities. Yet, many of these workers face economic pressures or unstable job conditions, which can sometimes lead to crimes in the workplace. For example:

  • A delivery worker might steal packages because of financial strain.
  • Factory workers might engage in theft or vandalism during disputes with management.
  • Gig workers might falsify records, such as fake deliveries, to boost earnings.

While these incidents may seem small at first glance, they can lead to significant business losses. Beyond financial damage, such crimes can also erode trust between employers, employees, and customers. For example, if a delivery driver steals a package, it’s not just the business that suffers—the customer loses trust in the service.

Now, with the gig economy rapidly expanding, the risks are growing. Unlike traditional employees, gig workers often operate unsupervised, making thorough hiring practices even more critical. That’s where Background Verification (BGV) comes in. For employers, BGV isn’t just about ticking boxes—it’s about ensuring you can trust the people you hire, especially in roles that involve valuable assets, sensitive information, or direct customer interaction.

The Impact Of Blue-Collar Crime

India’s reliance on blue-collar workers is the backbone of its economy. These workers are vital to business operations, from the delivery riders powering the gig economy to factory labourers in manufacturing hubs. However, with great dependency comes vulnerability, as blue-collar crimes pose an ever-present threat to organisational efficiency, finances, and reputation.

What Is Blue-Collar Crime?

Blue-collar crimes refer to tangible, often visible offences such as theft, fraud, vandalism, and even workplace sabotage. Individuals in manual labour or low-income roles typically perpetrate these crimes. While they may appear small in isolation, the cumulative impact can be devastating for businesses, especially in sectors like logistics, e-commerce, construction, and manufacturing.

Major Categories Of Blue-Collar Crimes

1. Theft and Pilferage

Theft is the most prevalent blue-collar crime, particularly in industries where workers handle valuable goods or materials. From logistics to retail, theft undermines operational trust and causes significant financial losses.

  • Case in Point:
    In Bengaluru, a delivery scam cost an IT firm ₹23 crore as insiders misused courier services to manipulate consignments.
  • Impact:
    Businesses not only lose money but also risk damaging client relationships due to delayed or lost shipments.

2. Fraud

Fraud often goes undetected until the damage is too large to ignore. This includes attendance manipulation, fake payrolls, and exaggerated work claims.

  • Case in Point:
    In Noida, a former e-commerce employee created fake transactions, stealing ₹57 lakh over months. The fraud highlighted the need for robust internal systems and verification checks.
    Impact:
    Fraudulent activities erode operational efficiency and inflate overheads, forcing businesses to invest in costly audits.

3. Vandalism and Sabotage

Labour disputes frequently escalate into vandalism, targeting company infrastructure and equipment. These acts often stem from dissatisfaction over wages or working conditions.

Characteristics Of Blue-Collar Crimes

Below are the key characteristics of blue-collar crime:

  1. Direct and Physical Nature
    Blue-collar crimes often involve physical effort, force, or direct action. Examples include theft, assault, burglary, and vandalism.
  2. Immediate Gains
    Unlike white-collar crimes, which may involve long-term fraud or manipulation, blue-collar crimes usually aim for immediate financial or personal gain, such as stealing money, goods, or valuables.
  3. Visible Acts
    These crimes are more likely to occur in public spaces and are easier to observe or detect, as they often involve physical interactions. For instance, shoplifting or street robbery can be quickly noticed.
  4. Violence or Threat of Violence
    Many blue-collar crimes involve the use of violence, threats, or coercion to achieve their objective, such as in armed robberies or physical assaults.
  5. Lower Socioeconomic Background
    Blue-collar crimes are often associated with individuals from working-class or low-income backgrounds who may commit offences due to financial strain, lack of resources, or unemployment.
  6. Opportunistic Nature
    These crimes often happen spontaneously or impulsively rather than through elaborate planning. For instance, someone might steal items when they see an opportunity, like an unlocked vehicle or unattended valuables.
  7. High Detection and Prosecution Rates
    Since blue-collar crimes are often physical and direct, they are more likely to be reported, detected, and prosecuted by law enforcement agencies compared to complex financial or cybercrimes.
  8. Involvement of Local Jurisdiction
    Blue-collar crimes are usually handled by local police and courts, as they tend to occur within communities and do not typically cross-national or international boundaries.
  9. Visible Consequences
    The impact of blue-collar crimes is often tangible and immediate. Examples include property damage, physical harm, or stolen goods, which directly affect victims and communities.
  10. Common Types of Crimes
    Examples of blue-collar crimes include:
  • Theft and Burglary: Breaking into homes or businesses to steal items.
  • Assault: Physical attacks on individuals.
  • Vandalism: Intentional property damage.
  • Drug-Related Offences: Possession, distribution, or use of illegal drugs.
  • Shoplifting: Stealing from retail stores.
  • Robbery: Forcefully taking someone’s belongings, often with threats or violence.

The Effects Of Blue-Collar Crime

Beyond immediate losses, the long-term effects of blue-collar crime can be far-reaching:

  • Operational Disruptions: Stolen goods or damaged infrastructure can halt production lines, delay shipments, and create workflow bottlenecks.
  • Reputation Damage: Crimes committed by employees, especially in customer-facing roles, tarnish a company’s brand image.
  • Increased Costs: Businesses must allocate more resources to security, insurance, and damage control, driving up operational costs.

The Role Of Background Verification In Preventing Theft and Pilferage

Theft and pilferage are silent but persistent threats to industries reliant on blue-collar workers. From warehouses to e-commerce logistics, and construction sites to retail outlets, theft does not just result in direct financial loss but also operational inefficiencies, increased costs, and damaged reputations. Addressing these risks requires proactive measures, with Background Verification (BGV) emerging as a key strategy.

The Vulnerabilities That Enable Theft

Theft often stems from a combination of systemic and individual vulnerabilities, including:

  1. Unsupervised Access to Assets: In industries like warehousing or delivery, workers frequently handle valuable goods with minimal oversight.
  2. Economic Pressures: Financial strain, compounded by low wages and job insecurity, drives many to opportunistic theft.
  3. Operational Loopholes: Decentralised operations, high attrition rates, and temporary workforce reliance make it easier for employees to exploit gaps in processes.

For example, in industries where goods are in transit—such as logistics or e-commerce—the lack of end-to-end tracking creates opportunities for theft without immediate detection.

How Background Verification Strengthens Workplace Safety And Reduces Crimes

Workplace safety is non-negotiable for industries that rely on blue-collar workers. These roles often involve high-risk environments, such as construction sites, factories, and logistics hubs, where the margin for error is slim. Equally critical is fostering a harmonious work environment, as unresolved disputes can lead to hostility, disruptions, or even violence.

While safety protocols and conflict resolution mechanisms are essential, Background Verification (BGV) offers an upstream solution by preventing risky hires before they enter the organisation. Robust BGV ensures that employees are vetted for reliability, competence, and behavioural stability, reducing both safety hazards and interpersonal conflicts.

The Unique Workplace Safety Challenges of Blue-Collar Roles

  1. High Risk of Accidents:
    • Workers in construction, manufacturing, and logistics handle heavy machinery, hazardous materials, or physically demanding tasks. A single misstep—due to negligence, lack of skill, or substance abuse—can lead to severe accidents.
    • For example, untrained forklift operators have been cited in multiple factory accidents, causing injuries, operational delays, and legal liabilities.
  2. Increased Susceptibility to Workplace Conflicts:
    • In high-pressure environments, personal grievances or aggressive behaviour can escalate quickly into disputes or physical altercations.
    • Industries with mixed demographics or migrant labour forces often face cultural or language barriers, exacerbating misunderstandings.
  3. Substance Abuse and Its Impact on Safety:
    • Substance abuse among workers is a growing concern, particularly in sectors requiring precision, focus, and physical endurance. Impaired judgment or coordination can endanger not just the individual but their colleagues and the organisation at large.

How Background Verification Addresses Safety Risks

Comprehensive BGV processes serve as a preventative shield, ensuring that only trustworthy and competent individuals join the workforce. Here’s how it works:

1. Criminal History Screening

  • Why It Matters:
    Criminal records provide a direct indicator of past behaviour that may pose risks to workplace safety, such as violent conduct, theft, or substance-related offences.
  • How It Works:
    • Integration with local, national, and global crime databases for thorough checks.
    • Verification of court records and police cases to identify unresolved legal issues.
  • Real-World Impact:
    Many organisations have successfully filtered out high-risk hires by implementing criminal background checks, preventing potential disruptions down the line.

2. Behavioural and Reference Checks

  • Why It Matters:
    Past employers can offer valuable insights into a candidate’s temperament, work ethic, and conflict-resolution skills, which are rarely captured in resumes.
  • How It Works:
    • Direct interviews with former supervisors to evaluate behavioural tendencies.
    • Analysing feedback for patterns of aggression, insubordination, or absenteeism.
  • Key Insight:
    Workers with a history of escalating conflicts or insubordination are flagged, enabling hiring managers to make informed decisions.

3. Drug/Substance Abuse Screening

  • Why It Matters:
    Drug/Substance abuse is a leading contributor to workplace accidents and absenteeism. Ensuring a drug-free workforce enhances safety and productivity.
  • How It Works:
    • Pre-employment drug testing for high-risk roles, such as machinery operators or drivers.
    • Periodic random tests to deter substance use among existing employees.
  • Case for Action:
    Industries that introduced mandatory drug testing reported a measurable reduction in workplace incidents, contributing to safer environments.

4. Qualification and Skill Validation

  • Why It Matters:
    Inaccurate claims about skills or certifications can result in unqualified individuals operating machinery or handling hazardous tasks.
  • How It Works:
  • Impact:
    This step ensures that workers meet the required standards for roles involving specialised tasks, reducing the risk of accidents due to incompetence.

Legal Protections For Blue-Collar Workers Under India’s New Criminal Laws

The Bharatiya Nyaya Sanhita (BNS), Bharatiya Nagarik Suraksha Sanhita (BNSS), and Bharatiya Sakshya Adhiniyam (BSA) introduce critical provisions that impact blue-collar crimes and safeguard accused individuals, many of whom come from vulnerable backgrounds. These laws aim to ensure transparency, timely justice, and protection from systemic exploitation.

1. Safeguards During Arrest and Detention

Under the BNSS, 2023:

  • Section 35 mandates that police inform individuals of the grounds for their arrest and videograph the process to ensure accountability.
  • Accused persons must undergo a mandatory medical examination at the time of arrest, preventing custodial abuse and safeguarding their physical well-being.
  • For bailable offences like petty theft or vandalism, provisions ensure timely release on bail, minimising unnecessary detention.

2. Time-Bound Investigation and Trial

The BNSS introduces strict timelines to expedite justice:

  • Investigations for non-serious offences must be completed within 60 days.
  • Trial proceedings are streamlined, ensuring judgments are delivered without prolonged delays that disproportionately impact blue-collar workers who often lack resources for prolonged legal battles.

3. Proportional Penalties and Rehabilitation

The BNS, 2023 balances punitive measures with rehabilitation for minor offences:

  • For petty theft (Section 304) or vandalism, courts can impose community service as an alternative to imprisonment, ensuring livelihoods are not disrupted.
  • Repeat offences carry stricter penalties, but the law recognises economic distress as a factor in first-time offences.

4. Evidentiary Safeguards

The Bharatiya Sakshya Adhiniyam (BSA) strengthens protections for accused individuals through:

  • Digital and Forensic Evidence: Cases involving theft or property damage must rely on tangible evidence such as surveillance footage or forensic analysis to prevent wrongful accusations.
  • Videography of Searches: Searches of worker housing or premises must be recorded, ensuring transparency and preventing harassment.

Reducing Disputes Through Foolproof BGV

BGV also plays a pivotal role in minimising workplace disputes by identifying candidates likely to cause interpersonal challenges.

  1. Employment History Analysis:
    • Frequent job changes or unexplained gaps often signal unresolved conflicts or behavioural issues in previous roles.
    • Verifying these patterns provides insights into a candidate’s compatibility with team dynamics.
  2. Conflict Screening Through References:
    • Past supervisors may share instances of poor collaboration, aggressive tendencies, or disciplinary actions, which might not appear in formal records.
    • Analysing such feedback helps filter out candidates with a history of disruptive behaviour.
  3. Cultural Fit Assessment:
    • Reference checks can reveal a candidate’s adaptability to diverse work environments, particularly in industries employing migrant workers or culturally diverse teams.

The Business Case for Comprehensive BGV

  1. Fewer Accidents and Disruptions:
    Vetting candidates thoroughly reduces safety incidents, ensuring uninterrupted operations and lower insurance premiums.
  2. Stronger Team Cohesion:
    A pre-screened workforce is more likely to work collaboratively, reducing friction and improving morale.
  3. Legal and Reputational Protection:
    Preventing hires with a history of violence or substance abuse minimises the risks of lawsuits or public scandals following workplace incidents.
  4. Cost-Effective Risk Mitigation:
    While BGV requires an initial investment, it prevents far larger expenses tied to workplace accidents, disputes, or turnover.

Blue-Collar Crime Risks In The Gig Economy

  1. Theft of Goods:
    • Delivery executives in e-commerce or logistics roles often handle expensive items such as electronics, which are vulnerable to theft.
    • Poor oversight during last-mile delivery increases the likelihood of packages being stolen or tampered with.
  2. Fraudulent Activity:
    • Workers may falsify task completions, such as marking undelivered orders as “delivered,” resulting in financial and reputational damage.
    • Ghost workers or duplicate accounts can inflate operational costs for gig platforms.
  3. Data Misuse:
    • Gig workers with access to sensitive customer details (e.g., addresses, payment data) may exploit this information for scams or unauthorised sales.
  4. Untraceable Employees:
    • Without verified identities or accurate addresses, tracing workers involved in theft or fraud becomes challenging.

These crimes not only result in immediate losses but also erode trust between businesses, customers, and gig workers.

Why AuthBridge Is the Right Partner for Your BGV Needs

AuthBridge offers cutting-edge solutions designed to address the specific challenges of blue-collar and gig workforce verification. With nearly two decades of experience, AuthBridge has consistently delivered results through:

  1. Advanced Screening Technology: AI-driven platforms provide accurate and real-time verification.
  2. Comprehensive Criminal Checks: Access to extensive databases ensures thorough risk assessment.
  3. Customised Solutions: Tailored verification processes meet the unique needs of different industries.
  4. Proven Track Record: Trusted by leading organisations to build safer and more trustworthy workforces.

Conclusion

Blue-collar crime is not an inevitability—it is a challenge that can be tackled with the right tools and strategies. By investing in robust BGV practices, businesses can safeguard their operations, protect customer trust, and foster a culture of accountability and security.

In an increasingly competitive world, where trust is a key differentiator, organisations that prioritise verification processes will not only reduce risks but also position themselves as leaders in ethical and secure workforce management.

RBI P2P New Guidelines

RBI Updates P2P Lending Guidelines: All You Need To Know

Peer-to-peer (P2P) lending has emerged as a significant alternative to traditional banking channels in India, offering a platform for individuals to lend and borrow money directly without the intervention of banks. As the popularity of these platforms has grown, so too needs robust regulation to ensure transparency, fairness, and protection for both lenders and borrowers. The Reserve Bank of India (RBI), recognizing the potential and the risks associated with P2P lending, has been proactive in setting up a regulatory framework that governs this sector. Recently, the RBI issued updated guidelines aimed at enhancing the transparency and compliance of Non-Banking Financial Company-Peer to Peer Lending Platforms (NBFC-P2P Lending Platforms). These revisions are designed to address the evolving dynamics of the P2P lending space and to curb practices that could undermine the stability and integrity of the financial system.

Overview Of The Revised RBI P2P Lending Guidelines

The Reserve Bank of India’s updated guidelines for P2P lending platforms have introduced several key changes aimed at improving transparency, safeguarding the interests of lenders and borrowers, and ensuring that P2P platforms operate within a well-defined regulatory framework. These guidelines have been formulated after observing certain irregular practices in the industry that violated earlier regulations. The revised guidelines focus on several critical aspects of P2P lending, including the prohibition of credit guarantees, stricter fund transfer rules, restrictions on cross-selling, and enhanced disclosure requirements. These changes are expected to bring about a more transparent and accountable P2P lending environment in India.

Revised P2P Lending Guidelines Explained

No Credit Guarantee Or Enhancement By NBFC-P2P Entities

One of the most significant changes in the revised guidelines is the prohibition of credit guarantees and enhancements by NBFC-P2P entities. Previously, some P2P platforms offered credit guarantees that provided lenders with a sense of security by assuring them of returns even in the event of borrower defaults. However, this practice was filled with risks as it tended to hide the true level of late/missed payments and gave a misleading impression of the platform’s portfolio performance. The RBI has now explicitly banned NBFC-P2P entities from assuming any credit risk, meaning they cannot offer any form of credit guarantee. This shift places the onus of risk squarely on the lenders, ensuring that they fully understand the risks involved in P2P lending. For borrowers, this could mean higher interest rates as lenders factor in the additional risk, but it also means a more transparent and realistic assessment of their creditworthiness.

Fund Transfer Through Escrow Account

Another critical update in the RBI guidelines pertains to the management of funds through escrow accounts. Previously, NBFC-P2P platforms were required to maintain two escrow accounts—one for funds from lenders pending disbursals and another for collections from borrowers. However, there was no strict timeline for the transfer of funds between these accounts, leading to potential delays and inefficiencies. The revised guidelines now mandate that funds in these escrow accounts must be transferred within one business day (T+1) of receipt. This requirement is aimed at enhancing the efficiency of fund transfers and reducing the risks associated with delays. For lenders, this means quicker access to their funds, while for borrowers, it translates to faster loan disbursements, which can be crucial in cases of urgent financial need.

Cap On Lending Amounts And Net Worth Certificate Requirements

The RBI has also introduced stricter regulations regarding the amount that individual lenders can lend through P2P platforms. As per the updated guidelines, the cumulative lending limit for individual lenders across all P2P platforms has been capped at Rs 50 lakh. Additionally, lenders who wish to extend loans exceeding Rs 10 lakh across P2P platforms are now required to provide a net worth certificate issued by a Chartered Accountant, confirming that they have a minimum net worth of Rs 50 lakh. These measures are designed to ensure that lenders do not overextend themselves financially and that they have the necessary financial backing to cover potential losses. This cap also helps to maintain a balance in the P2P lending market, preventing the concentration of risk among a small group of lenders and promoting broader participation.

Restrictions On Cross-Selling Of Products

The revised guidelines also impose restrictions on the cross-selling of products by P2P platforms. Specifically, NBFC-P2P entities are now prohibited from cross-selling any products other than loan-specific insurance products. This move is intended to reduce conflicts of interest and to prevent platforms from burdening borrowers with additional products that may not be in their best interest. Previously, some platforms had been offering credit enhancement products and loan protection insurance, which, while potentially beneficial, also carried the risk of misleading lenders and increasing the financial burden on borrowers. By restricting cross-selling, the RBI aims to ensure that P2P platforms remain focused on their core function of facilitating loans and that borrowers are not pressured into purchasing unnecessary add-ons.

Monthly Portfolio Performance And NPA Disclosures

In a bid to enhance transparency, the RBI has mandated that P2P platforms must now disclose their portfolio performance, including details on non-performing assets (NPAs) and any pre-NPA delinquencies, every month. This requirement is expected to provide lenders with a clearer picture of the risks associated with lending on a particular platform. Regular disclosures will also allow lenders to make more informed decisions, as they will have access to up-to-date information on the performance of the platform’s loan portfolio. For borrowers, this could lead to more competitive interest rates, as lenders adjust their risk assessments based on the disclosed data. The emphasis on transparency is a crucial step in building trust in the P2P lending ecosystem, which is essential for its long-term growth and sustainability.

Revised Fee Structure For P2P Platforms

The RBI has also revised the fee structure that P2P platforms can charge for their services. Under the new guidelines, fees must either be a fixed amount or a fixed percentage of the principal amount involved in the lending transaction, and they cannot be contingent upon the borrower’s repayment performance. This change is aimed at ensuring that P2P platforms are compensated fairly for their services, while also preventing them from taking on additional risk by tying their fees to loan performance. For lenders, this means greater clarity and predictability in terms of the costs associated with using P2P platforms. It also ensures that platforms are incentivised to focus on the efficient and effective facilitation of loans, rather than on maximising their fee income through risky lending practices.

Industry Response To The Revised P2P Lending Guidelines

These measures have triggered significant reactions from industry members, who are now considering approaching the central bank to seek amendments and clarifications.

Concerns Over T+1 Settlement Rule

One of the primary concerns raised by P2P lending platforms pertains to the new requirement that mandates the clearance of funds in the escrow accounts of lenders and borrowers within a day (T+1). Many industry players find this rule to be overly stringent. The Association of P2P Lending Platforms, representing the interests of these platforms, is planning to request an extension of this timeline to T+2 or even T+3 days. They argue that deploying funds within a single day poses practical challenges, which could hamper the efficiency of their operations.

Intent Behind The Regulations

The RBI’s regulations aim to ensure that lenders’ money does not remain with the P2P platform, thereby safeguarding the interests of lenders. From the perspective of lenders, this is a positive move, as it ensures that their funds are promptly returned once the borrower repays the loan. This measure is seen as a step towards reducing the risk associated with P2P lending by preventing platforms from holding onto lenders’ money for extended periods.

The Current Size Of The P2P Lending Industry In India

The P2P lending industry in India is currently valued at approximately ₹7,000-8,000 crore. There are about 20 P2P platforms in the country, all registered with the RBI as Non-Banking Financial Companies (NBFCs). These platforms generate revenue through registration fees, processing fees, and fees collected during repayment.

Conclusion

The recent updates to the RBI P2P guidelines mark a significant step forward in the regulation of the P2P lending industry in India. By addressing key issues such as credit risk, fund management, cross-selling, and transparency, the RBI is working to ensure that P2P platforms operate fairly, transparently, and in the best interest of all participants. While these changes may initially pose challenges for some platforms, they ultimately aim to promote the long-term stability and growth of the P2P lending market. As the industry continues to evolve, these guidelines will play a crucial role in shaping its future, ensuring that it remains a trusted and reliable option for both lenders and borrowers in India.

FAQs around updated P2P Lending Guidelines

The current cumulative lending limit for individual lenders across all P2P platforms stands at INR 50 lakh. 

In India, the RBI sets a maximum limit for P2P lending, usually restricting each lender to a total of Rs. 10 lakhs across all platforms.

The Reserve Bank of India (RBI) has established specific regulations for Peer-to-Peer (P2P) lending platforms to ensure the safety and transparency of the sector. Here are the key points of the RBI regulations for P2P lending:

  1. Registration Requirement: P2P lending platforms must be registered as Non-Banking Financial Companies (NBFCs) with the RBI.
  2. Cap on Lending and Borrowing:
    • Per Lender Limit: A lender cannot invest more than Rs. 50,00,000 across all P2P platforms. Additionally, the exposure of a single lender to a single borrower is capped at Rs. 50,000.
    • Per Borrower Limit: A borrower can borrow a maximum of Rs. 10,00,000 across all P2P platforms.
  3. Escrow Account: All fund transfers between participants must be through an escrow account held by a bank, ensuring that the P2P platform does not directly handle the funds.
  4. Disclosure Requirements: P2P platforms must disclose all relevant information about potential borrowers to lenders, including credit scores, loan purpose, and terms.
  5. Prohibition on Cross-Border Transactions: P2P lending is restricted to domestic transactions, meaning lenders and borrowers must be Indian residents.
  6. Operational Restrictions:
    • P2P platforms cannot provide any form of credit enhancement or guarantee.
    • They cannot hold deposits from lenders or borrowers.
    • The platform’s role is limited to facilitating transactions between lenders and borrowers without participating directly in the lending or borrowing process.
  7. Grievance Redressal: Platforms must have a grievance redressal mechanism in place to resolve complaints from participants.
  8. Reporting Obligations: P2P platforms are required to submit regular reports to the RBI on their financial health, operations, and compliance with regulations.

An NPA (Non-Performing Asset) refers to a loan where the borrower has missed scheduled payments for a certain period. A high NPA rate signals that many borrowers are defaulting, which could raise concerns about the platform’s effectiveness in screening borrowers.

What is supplier onboarding and process to onboard suppliers at scale

What Is Supplier Onboarding? How To Onboard New Suppliers?

What Is Supplier Onboarding?

Supplier onboarding and due diligence is the process of gathering important information on prospective suppliers, vendors, distributors, or other third parties for identity validation and risk assessment. After 360-degree due diligence, businesses can onboard them into their platform for the smooth functioning of supply chain operations. The entire process of invitation, onboarding, screening, contracting, and post onboarding monitoring comes under supplier onboarding. 

In simple words, it’s about enabling seamless and efficient processes so that businesses can develop strong relationships with third parties and prevent frauds from hampering their business.

 supplier onboarding process

Onboarding new suppliers at speed and scale can be tricky. Especially when you do not have an established methodology and smart technology in place. It can expose your business to reputational risks and compliance failures from the get-go. A streamlined process for onboarding a new supplier can catapult your business to great success.

How To Onboard A New Supplier With Software?

Too many bells and whistles in the supplier onboarding process might lead to distraction and loss of profitable associations. Adoption of a simplistic yet powerful onboarding technology keeps you at the vanguard, reduces overhead costs, and enables risk-free third-party onboarding. AuthBridge’s third-party onboarding solution helps businesses with custom workflows and automated end-to-end journeys for supplier and vendor onboarding, and much more while also covering post-onboarding risk watch and screening.

Step-By-Step Process For Supplier Onboarding

Assess Your Business As Well As Suppliers’ Needs

A great supplier and vendor onboarding process is not just about bringing in new suppliers and vendors but also providing them value. Be mindful of your suppliers’ needs and expectations to set up the right approach to working with them. Assess their requirements, take the right actions, and turn them into measurable goals.

Deploying The Right Tech For Seamless Onboarding

The right onboarding technology can eliminate lengthy, manual, and complex form-filling verification processes for third parties. In this tech-savvy era, where everybody wants advanced, time-saving, and customized experiences, such processes can lead to higher partner dissatisfaction. Moreover, manual verification adds to the operational costs and is prone to errors.

For seamless onboarding, minimal funnel dropouts, and 10x faster service activation, it is imperative to digitize the due diligence process with customisable workflows. With the help of AuthBridge’s AI-powered onboarding technology, businesses can onboard third parties at scale, eliminate delays, and reduce onboarding TAT by up to 80%.

Frauds And Risks Assessment

Catching identity thefts, assessing warning signs, and ensuring that only genuine parties are onboarded into the platform is vital. It will help mitigate informational, operational, financial, and regulatory risks. AuthBridge’s onboarding technology is built on OCR (Optical Character Recognition), facial recognition, and liveness detection technologies, ensuring the least manual intervention.

With key checks like Identification Documents of India/AML checks, GST and bank account verification, criminal database, court record checks, police clearance certificates, and financial/reputational due diligence, businesses can prevent third-party risks and always stay on the right side of the law.

Document Collection And Signatures

Collecting client documents and storing them for future as well as for compliance and audit purposes becomes strenuous when done manually and at scale. Businesses can reduce this stress during the supplier onboarding process by digitizing documentation with digital signing solutions.

SignDrive by AuthBridge is a digital DTM platform (document transaction management) that helps businesses automate document and workflow management and creates legally enforceable digital signatures reducing the need for wet signatures.

Post Onboarding Feedback

After verification and successfully onboarding new clients, businesses must take feedback from third parties to know their experience or if they face any friction during onboarding. A quick check-in call can help businesses strengthen relationships with their partners and give them a sense that you value them.

Conclusion

Integrate technology to automate the entire wheel of the supplier onboarding process and make the complex journeys easier. Get future-ready with AI-powered onboarding technology to enable risk-free third-party onboarding and build authentic relationships with AuthBridge – India’s leading authentication and onboarding company.

FAQs on Supplier Onboarding

Supplier onboarding refers to the process of integrating new suppliers into a company’s supply chain and procurement system. It involves all the steps necessary to establish a working relationship with a supplier, ensuring they meet the company’s standards and requirements.

The onboarding process refers to the structured approach a company takes to integrate new employees, suppliers, or partners into its operations and culture. This process ensures that new arrivals understand their roles, the company’s expectations, and how to navigate their new environment. 

The 5 C’s of onboarding—Compliance, Clarification, Culture, Connection, and Competence—form a framework to ensure a thorough and effective integration of new employees. Compliance focuses on adhering to legal and company policies, Clarification provides clear job roles and expectations, Culture helps new hires understand and assimilate into the company’s values and work environment, Connection fosters relationships with team members and mentors, and Competence equips new hires with the necessary skills and knowledge for their roles.

The four stages of supplier management encompass the entire lifecycle of working with suppliers. Supplier Selection involves choosing the right suppliers based on quality, cost, and reliability. Supplier Onboarding integrates new suppliers into the company’s systems, ensuring they understand and meet requirements. Supplier Performance Management involves monitoring and evaluating supplier performance to ensure they meet agreed standards. Finally, Supplier Relationship Management focuses on maintaining a productive, collaborative relationship, resolving issues, and seeking opportunities for improvement.

Hi! Let’s Schedule Your Call.

To begin, Tell us a bit about “yourself”

The most noteworthy aspects of our collaboration has been the ability to seamlessly onboard partners from all corners of India, for which our TAT has been reduced from multiple weeks to a few hours now.

- Mr. Satyasiva Sundar Ruutray
Vice President, F&A Commercial,
Greenlam

Thank You

We have sent your download in your email.

Case Study Download

Want to Verify More Tin Numbers?

Want to Verify More Pan Numbers?

Want to Verify More UAN Numbers?

Want to Verify More Pan Dob ?

Want to Verify More Aadhar Numbers?

Want to Check More Udyam Registration/Reference Numbers?

Want to Verify More GST Numbers?