{"id":57069,"date":"2024-02-26T10:08:37","date_gmt":"2024-02-26T10:08:37","guid":{"rendered":"https:\/\/authbridge.com\/staging\/?p=57069"},"modified":"2024-02-27T06:43:46","modified_gmt":"2024-02-27T06:43:46","slug":"streamlining-customer-onboarding-security-a-deep-dive-into-video-kyc","status":"publish","type":"post","link":"https:\/\/authbridge.com\/staging\/resources\/blogs\/streamlining-customer-onboarding-security-a-deep-dive-into-video-kyc\/","title":{"rendered":"Streamlining Customer Onboarding &amp; Security: A Deep Dive into Video KYC\u00a0"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"57069\" class=\"elementor elementor-57069\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-c7b89c7 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c7b89c7\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2b37c65\" data-id=\"2b37c65\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b055bd0 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b055bd0\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3def2de\" data-id=\"3def2de\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-17265c3 elementor-widget elementor-widget-text-editor\" data-id=\"17265c3\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.21.0 - 26-05-2024 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#69727d;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#69727d;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\t<p>In light of recent trends, there&#8217;s been a surge in prioritising user identification and verification across various domains, be it employees, gig workers, customers, or third parties. This heightened focus stems from the escalating instances of fraudulent activities, the proliferation of sophisticated tools and the dark web for malicious intents, and the evolving need to provide a seamless onboarding experience in our fast-paced, dynamic world.\u00a0<\/p><p><\/p><p>With KYC procedures taking centre stage, there&#8217;s a significant emphasis on ensuring thorough verification, particularly for residents in remote areas, reflecting a commitment to security and compliance.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-c8f2b21 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c8f2b21\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4965d92\" data-id=\"4965d92\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4cab52e elementor-widget elementor-widget-heading\" data-id=\"4cab52e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.21.0 - 26-05-2024 *\/\n.elementor-heading-title{padding:0;margin:0;line-height:1}.elementor-widget-heading .elementor-heading-title[class*=elementor-size-]>a{color:inherit;font-size:inherit;line-height:inherit}.elementor-widget-heading .elementor-heading-title.elementor-size-small{font-size:15px}.elementor-widget-heading .elementor-heading-title.elementor-size-medium{font-size:19px}.elementor-widget-heading .elementor-heading-title.elementor-size-large{font-size:29px}.elementor-widget-heading .elementor-heading-title.elementor-size-xl{font-size:39px}.elementor-widget-heading .elementor-heading-title.elementor-size-xxl{font-size:59px}<\/style><h2 class=\"elementor-heading-title elementor-size-default\">Navigating the Regulatory Landscape -\nImportance of KYC in India's Financial Sector\n<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-23a48ab elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"23a48ab\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5b2c4a4\" data-id=\"5b2c4a4\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1b9fb4c elementor-widget elementor-widget-text-editor\" data-id=\"1b9fb4c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">KYC procedures are measures regulated entities take to identify and verify their customers before transacting or establishing an account-based relationship. Such identification helps business entities to understand their customers\/clients\/third parties and their financial dealings, thereby reducing the likelihood of money laundering activities and terrorist financing.\u00a0<\/span><\/p><p><\/p><p><span style=\"font-weight: 400;\">In India, the KYC process has been a matter of great discussion among stakeholders \u2013 Government, regulators, entities and customers. The financial services industry, being the most highly regulated, needs to perform specific activities to stay on the right side of the law and mitigate the risk of money laundering and terrorist financing &#8211; such as client due diligence, maintenance of records, suspicious transaction reporting, etc. IRDAI, RBI and SEBI primarily regulate this industry; hence, the respective regulators develop the policy framework regarding anti-money laundering (AML) and counter-terrorism financing (CFT) to ensure customer security and prevent money laundering.<\/span><\/p><p><\/p><p><span style=\"font-weight: 400;\">To ensure this, obtaining officially valid documents from the individuals as proof of identity and proof of address is crucial. In addition, certain KYC norms need to be followed during the verification process to verify the documents\/ information proofs that customers have submitted.<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7f06038 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7f06038\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-07d2a66\" data-id=\"07d2a66\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c745049 elementor-widget elementor-widget-heading\" data-id=\"c745049\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Video KYC - The Crucial Emerging Trend<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a583f09 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a583f09\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-aed3f0c\" data-id=\"aed3f0c\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ceb82c3 elementor-widget elementor-widget-text-editor\" data-id=\"ceb82c3\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">As the world becomes increasingly digital, organisations across industries are adopting new technologies to streamline processes and meet rising onboarding and verification demands. Among these developments, one is Video KYC. With digital transformation, industries like banking, finance, e-commerce, staffing and recruitment, health and pharma are more inclined to enable remote verification and onboarding; Video KYC is emerging as a game-changer in transforming the verification process.<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-e87c6db elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e87c6db\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a7572a2\" data-id=\"a7572a2\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d7c4bb4 elementor-widget elementor-widget-heading\" data-id=\"d7c4bb4\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What is a Video KYC?<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-acf732c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"acf732c\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c0e5195\" data-id=\"c0e5195\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-12b534b elementor-widget elementor-widget-text-editor\" data-id=\"12b534b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">As the name suggests, the <\/span><b>Video KYC process<\/b><span style=\"font-weight: 400;\"> is done through a live video call to ensure real-time verification of customers, vendors, suppliers, and other third parties. When the world tackled the COVID-19 crisis, businesses across industries faced various challenges in balancing security and seamless onboarding.\u00a0<\/span><\/p><p><\/p><p><span style=\"font-weight: 400;\">Traditional verification is surrounded by multiple challenges associated with complexity, high TAT, and operational costs. This became much more visible when the world tackled the pandemic crisis, and with traditional verification, it was nearly impossible to strike the right balance between security and seamless onboarding. Thus, more organisations are increasingly opting for video KYC to conduct verification at scale, reduce operational costs, and enable contactless onboarding.<\/span><\/p><p><\/p><p><span style=\"font-weight: 400;\">The video KYC\u00a0 process includes conducting video interactions in real-time and capturing the customer\u2019s data so that the required checks can be performed to ensure compliance with regulatory requirements. The process allows the verifier to capture and compare the individual\u2019s live image with the submitted NID (national identity document), creating a complete identity record.<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a4c65eb elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a4c65eb\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3bcd800\" data-id=\"3bcd800\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e776479 elementor-widget elementor-widget-heading\" data-id=\"e776479\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Traditional KYC vs. Video KYC<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7aed70f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7aed70f\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8962c9a\" data-id=\"8962c9a\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-09cce66 elementor-widget elementor-widget-text-editor\" data-id=\"09cce66\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">With technology evolving daily, V-KYC offers several advantages over traditional verification, including enhanced security, customer experience, and faster turnaround time.<\/span><\/p><p><span style=\"font-weight: 400;\"><i>Here is a detailed comparison between Traditional KYC and Video KYC:<\/i><\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-92541e8 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"92541e8\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3aaccac\" data-id=\"3aaccac\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-08af6e2 elementor-widget elementor-widget-text-editor\" data-id=\"08af6e2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p dir=\"ltr\" style=\"line-height: 2.1; background-color: #ffffff; margin-top: 0pt; margin-bottom: 15pt;\"><\/p><p><span id=\"docs-internal-guid-5ef89e1d-7fff-b182-5c3e-551779d9a412\"><\/span><\/p><div dir=\"ltr\" style=\"margin-left: 0pt;\" align=\"left\"><table style=\"border: none; border-collapse: collapse;\"><colgroup><col width=\"133\" \/><col width=\"234\" \/><col width=\"257\" \/><\/colgroup><tbody><tr style=\"height: 35.5pt;\"><td style=\"vertical-align: bottom; padding: 5pt 5pt 5pt 5pt; overflow: hidden; overflow-wrap: break-word; border: solid #e3e3e3 0.62499975pt;\"><p dir=\"ltr\" style=\"line-height: 2.057148; text-align: center; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 12pt; font-family: Calibri,sans-serif; color: #000000; background-color: transparent; font-weight: bold; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Key Area<\/span><\/p><\/td><td style=\"vertical-align: bottom; padding: 5pt 5pt 5pt 5pt; overflow: hidden; overflow-wrap: break-word; border: solid #e3e3e3 0.62499975pt;\"><p dir=\"ltr\" style=\"line-height: 2.057148; text-align: center; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 12pt; font-family: Calibri,sans-serif; color: #000000; background-color: transparent; font-weight: bold; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Traditional KYC<\/span><\/p><\/td><td style=\"vertical-align: bottom; padding: 5pt 5pt 5pt 5pt; overflow: hidden; overflow-wrap: break-word; border: solid #e3e3e3 0.62499975pt;\"><p dir=\"ltr\" style=\"line-height: 2.057148; text-align: center; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 12pt; font-family: Calibri,sans-serif; color: #000000; background-color: transparent; font-weight: bold; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Video KYC<\/span><\/p><\/td><\/tr><tr style=\"height: 52.75pt;\"><td style=\"vertical-align: middle; padding: 5pt 5pt 5pt 5pt; overflow: hidden; overflow-wrap: break-word; border: solid #e3e3e3 0.62499975pt;\"><p dir=\"ltr\" style=\"line-height: 2.057148; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 12pt; font-family: Calibri,sans-serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Process<\/span><\/p><\/td><td style=\"vertical-align: middle; padding: 5pt 5pt 5pt 5pt; overflow: hidden; overflow-wrap: break-word; border: solid #e3e3e3 0.62499975pt;\"><p dir=\"ltr\" style=\"line-height: 2.057148; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 12pt; font-family: Calibri,sans-serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Requires physical presence for document verification<\/span><\/p><\/td><td style=\"vertical-align: middle; padding: 5pt 5pt 5pt 5pt; overflow: hidden; overflow-wrap: break-word; border: solid #e3e3e3 0.62499975pt;\"><p dir=\"ltr\" style=\"line-height: 2.057148; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 12pt; font-family: Calibri,sans-serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Conducted remotely via video call for verification<\/span><\/p><\/td><\/tr><tr style=\"height: 52.75pt;\"><td style=\"vertical-align: middle; padding: 5pt 5pt 5pt 5pt; overflow: hidden; overflow-wrap: break-word; border: solid #e3e3e3 0.62499975pt;\"><p dir=\"ltr\" style=\"line-height: 2.057148; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 12pt; font-family: Calibri,sans-serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Documentation<\/span><\/p><\/td><td style=\"vertical-align: middle; padding: 5pt 5pt 5pt 5pt; overflow: hidden; overflow-wrap: break-word; border: solid #e3e3e3 0.62499975pt;\"><p dir=\"ltr\" style=\"line-height: 2.057148; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 12pt; font-family: Calibri,sans-serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Physical documents required (ID, address proof, etc.)<\/span><\/p><\/td><td style=\"vertical-align: middle; padding: 5pt 5pt 5pt 5pt; overflow: hidden; overflow-wrap: break-word; border: solid #e3e3e3 0.62499975pt;\"><p dir=\"ltr\" style=\"line-height: 2.057148; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 12pt; font-family: Calibri,sans-serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Digital documents accepted (scanned or uploaded)<\/span><\/p><\/td><\/tr><tr style=\"height: 34.75pt;\"><td style=\"vertical-align: middle; padding: 5pt 5pt 5pt 5pt; overflow: hidden; overflow-wrap: break-word; border: solid #e3e3e3 0.62499975pt;\"><p dir=\"ltr\" style=\"line-height: 2.057148; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 12pt; font-family: Calibri,sans-serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Time<\/span><\/p><\/td><td style=\"vertical-align: middle; padding: 5pt 5pt 5pt 5pt; overflow: hidden; overflow-wrap: break-word; border: solid #e3e3e3 0.62499975pt;\"><p dir=\"ltr\" style=\"line-height: 2.057148; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 12pt; font-family: Calibri,sans-serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">May take several days for completion, resulting in low TAT and delays<\/span><\/p><\/td><td style=\"vertical-align: middle; padding: 5pt 5pt 5pt 5pt; overflow: hidden; overflow-wrap: break-word; border: solid #e3e3e3 0.62499975pt;\"><p dir=\"ltr\" style=\"line-height: 2.057148; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 12pt; font-family: Calibri,sans-serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Real-time verification ensures faster TAT and quicker onboarding<\/span><\/p><\/td><\/tr><tr style=\"height: 52.75pt;\"><td style=\"vertical-align: middle; padding: 5pt 5pt 5pt 5pt; overflow: hidden; overflow-wrap: break-word; border: solid #e3e3e3 0.62499975pt;\"><p dir=\"ltr\" style=\"line-height: 2.057148; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 12pt; font-family: Calibri,sans-serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Cost<\/span><\/p><\/td><td style=\"vertical-align: middle; padding: 5pt 5pt 5pt 5pt; overflow: hidden; overflow-wrap: break-word; border: solid #e3e3e3 0.62499975pt;\"><p dir=\"ltr\" style=\"line-height: 2.057148; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 12pt; font-family: Calibri,sans-serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Higher due to physical setup and staff<\/span><\/p><\/td><td style=\"vertical-align: middle; padding: 5pt 5pt 5pt 5pt; overflow: hidden; overflow-wrap: break-word; border: solid #e3e3e3 0.62499975pt;\"><p dir=\"ltr\" style=\"line-height: 2.057148; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 12pt; font-family: Calibri,sans-serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Lower due to remote processes and reduced infrastructure<\/span><\/p><\/td><\/tr><tr style=\"height: 52.75pt;\"><td style=\"vertical-align: middle; padding: 5pt 5pt 5pt 5pt; overflow: hidden; overflow-wrap: break-word; border: solid #e3e3e3 0.62499975pt;\"><p dir=\"ltr\" style=\"line-height: 2.057148; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 12pt; font-family: Calibri,sans-serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Security<\/span><\/p><\/td><td style=\"vertical-align: middle; padding: 5pt 5pt 5pt 5pt; overflow: hidden; overflow-wrap: break-word; border: solid #e3e3e3 0.62499975pt;\"><p dir=\"ltr\" style=\"line-height: 2.057148; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 12pt; font-family: Calibri,sans-serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Relies on physical ID verification<\/span><\/p><\/td><td style=\"vertical-align: middle; padding: 5pt 5pt 5pt 5pt; overflow: hidden; overflow-wrap: break-word; border: solid #e3e3e3 0.62499975pt;\"><p dir=\"ltr\" style=\"line-height: 2.057148; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 12pt; font-family: Calibri,sans-serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Utilises biometric verification and encryption<\/span><\/p><\/td><\/tr><tr style=\"height: 52.75pt;\"><td style=\"vertical-align: middle; padding: 5pt 5pt 5pt 5pt; overflow: hidden; overflow-wrap: break-word; border: solid #e3e3e3 0.62499975pt;\"><p dir=\"ltr\" style=\"line-height: 2.057148; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 12pt; font-family: Calibri,sans-serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Accessibility<\/span><\/p><\/td><td style=\"vertical-align: middle; padding: 5pt 5pt 5pt 5pt; overflow: hidden; overflow-wrap: break-word; border: solid #e3e3e3 0.62499975pt;\"><p dir=\"ltr\" style=\"line-height: 2.057148; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 12pt; font-family: Calibri,sans-serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Limited by location. Inconvenient due to the need for a physical visit<\/span><\/p><\/td><td style=\"vertical-align: middle; padding: 5pt 5pt 5pt 5pt; overflow: hidden; overflow-wrap: break-word; border: solid #e3e3e3 0.62499975pt;\"><p dir=\"ltr\" style=\"line-height: 2.057148; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 12pt; font-family: Calibri,sans-serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Accessible from anywhere with an internet connection<\/span><\/p><\/td><\/tr><tr style=\"height: 52.75pt;\"><td style=\"vertical-align: middle; padding: 5pt 5pt 5pt 5pt; overflow: hidden; overflow-wrap: break-word; border: solid #e3e3e3 0.62499975pt;\"><p dir=\"ltr\" style=\"line-height: 2.057148; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 12pt; font-family: Calibri,sans-serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Verification Efficiency<\/span><\/p><\/td><td style=\"vertical-align: middle; padding: 5pt 5pt 5pt 5pt; overflow: hidden; overflow-wrap: break-word; border: solid #e3e3e3 0.62499975pt;\"><p dir=\"ltr\" style=\"line-height: 2.057148; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 12pt; font-family: Calibri,sans-serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Relatively slower due to paperwork, manual form-filling, and scheduling<\/span><\/p><\/td><td style=\"vertical-align: middle; padding: 5pt 5pt 5pt 5pt; overflow: hidden; overflow-wrap: break-word; border: solid #e3e3e3 0.62499975pt;\"><p dir=\"ltr\" style=\"line-height: 2.057148; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 12pt; font-family: Calibri,sans-serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Faster and more streamlined due to advanced technologies like OCR, liveness detection, face match, etc.<\/span><\/p><\/td><\/tr><tr style=\"height: 52.75pt;\"><td style=\"vertical-align: middle; padding: 5pt 5pt 5pt 5pt; overflow: hidden; overflow-wrap: break-word; border: solid #e3e3e3 0.62499975pt;\"><p dir=\"ltr\" style=\"line-height: 2.057148; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 12pt; font-family: Calibri,sans-serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Compliance<\/span><\/p><\/td><td style=\"vertical-align: middle; padding: 5pt 5pt 5pt 5pt; overflow: hidden; overflow-wrap: break-word; border: solid #e3e3e3 0.62499975pt;\"><p dir=\"ltr\" style=\"line-height: 2.057148; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 12pt; font-family: Calibri,sans-serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Compliance with regulations may vary<\/span><\/p><\/td><td style=\"vertical-align: middle; padding: 5pt 5pt 5pt 5pt; overflow: hidden; overflow-wrap: break-word; border: solid #e3e3e3 0.62499975pt;\"><p dir=\"ltr\" style=\"line-height: 2.057148; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 12pt; font-family: Calibri,sans-serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Enhanced compliance due to digital audit trails<\/span><\/p><\/td><\/tr><tr style=\"height: 52.75pt;\"><td style=\"vertical-align: middle; padding: 5pt 5pt 5pt 5pt; overflow: hidden; overflow-wrap: break-word; border: solid #e3e3e3 0.62499975pt;\"><p dir=\"ltr\" style=\"line-height: 2.057148; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 12pt; font-family: Calibri,sans-serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Flexibility<\/span><\/p><\/td><td style=\"vertical-align: middle; padding: 5pt 5pt 5pt 5pt; overflow: hidden; overflow-wrap: break-word; border: solid #e3e3e3 0.62499975pt;\"><p dir=\"ltr\" style=\"line-height: 2.057148; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 12pt; font-family: Calibri,sans-serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Limited flexibility in terms of scheduling<\/span><\/p><\/td><td style=\"vertical-align: middle; padding: 5pt 5pt 5pt 5pt; overflow: hidden; overflow-wrap: break-word; border: solid #e3e3e3 0.62499975pt;\"><p dir=\"ltr\" style=\"line-height: 2.057148; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 12pt; font-family: Calibri,sans-serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">More flexibility in scheduling video appointments<\/span><\/p><\/td><\/tr><tr style=\"height: 52.75pt;\"><td style=\"vertical-align: middle; padding: 5pt 5pt 5pt 5pt; overflow: hidden; overflow-wrap: break-word; border: solid #e3e3e3 0.62499975pt;\"><p dir=\"ltr\" style=\"line-height: 2.057148; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 12pt; font-family: Calibri,sans-serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Fraud Prevention<\/span><\/p><\/td><td style=\"vertical-align: middle; padding: 5pt 5pt 5pt 5pt; overflow: hidden; overflow-wrap: break-word; border: solid #e3e3e3 0.62499975pt;\"><p dir=\"ltr\" style=\"line-height: 2.057148; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 12pt; font-family: Calibri,sans-serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Limited fraud prevention measures<\/span><\/p><\/td><td style=\"vertical-align: middle; padding: 5pt 5pt 5pt 5pt; overflow: hidden; overflow-wrap: break-word; border: solid #e3e3e3 0.62499975pt;\"><p dir=\"ltr\" style=\"line-height: 2.057148; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 12pt; font-family: Calibri,sans-serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Enhanced fraud prevention with biometric verification<\/span><\/p><\/td><\/tr><tr style=\"height: 52.75pt;\"><td style=\"vertical-align: middle; padding: 5pt 5pt 5pt 5pt; overflow: hidden; overflow-wrap: break-word; border: solid #e3e3e3 0.62499975pt;\"><p dir=\"ltr\" style=\"line-height: 2.057148; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 12pt; font-family: Calibri,sans-serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Scalability<\/span><\/p><\/td><td style=\"vertical-align: middle; padding: 5pt 5pt 5pt 5pt; overflow: hidden; overflow-wrap: break-word; border: solid #e3e3e3 0.62499975pt;\"><p dir=\"ltr\" style=\"line-height: 2.057148; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 12pt; font-family: Calibri,sans-serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Limited scalability due to physical constraints<\/span><\/p><\/td><td style=\"vertical-align: middle; padding: 5pt 5pt 5pt 5pt; overflow: hidden; overflow-wrap: break-word; border: solid #e3e3e3 0.62499975pt;\"><p dir=\"ltr\" style=\"line-height: 2.057148; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 12pt; font-family: Calibri,sans-serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">More scalable due to remote access and automation<\/span><\/p><\/td><\/tr><\/tbody><\/table><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2f236f5 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2f236f5\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8cfd074\" data-id=\"8cfd074\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-96e6811 elementor-widget elementor-widget-heading\" data-id=\"96e6811\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Unlocking Efficiency: Video KYC Transforming Customer Verification Processes<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2de7e19 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2de7e19\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-cf59c33\" data-id=\"cf59c33\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d47d42b elementor-widget elementor-widget-text-editor\" data-id=\"d47d42b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul><li style=\"font-weight: 400;\" aria-level=\"1\"><b>Enhanced Customer Experience, Reduced Churn Rate:<\/b><span style=\"font-weight: 400;\"> Video KYC allows customers to complete the verification process remotely, eliminating the need to visit a physical location. Documents are accepted digitally and extracted via OCR, reducing the need for physical paperwork and manual form-filling. Also, the process is fast and typically completed within minutes, compared to traditional KYC, which may take several days due to paperwork and scheduling constraints.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><b>Goodbye to Low Efficiency &amp; High Cost:<\/b><span style=\"font-weight: 400;\"> Video KYC reduces costs associated with physical infrastructure and staff required for in-person verification. Financial institutions can seamlessly verify customer identities and assess risk profiles in a streamlined and standardised manner while adhering to compliance requirements.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><b>Wider customer reach: <\/b><span style=\"font-weight: 400;\">Video KYC can be accessed from anywhere with an internet connection, making it more inclusive for individuals in remote areas. Also, it becomes much easier for financial institutions to expand their customer base and tap into new markets by reaching individuals without needing access to a physical branch or office.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><b>Enhanced Security:<\/b><span style=\"font-weight: 400;\"> Video KYC often incorporates AI\/ML and biometric verification, providing a higher level of security than traditional methods reliant on physical IDs. This can help financial institutions detect and prevent fraudulent activities more effectively, reducing the risk of financial losses and reputational damage.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><b style=\"font-size: inherit; letter-spacing: 0px;\">Compliance Framework:<\/b><span style=\"font-size: inherit; letter-spacing: 0px;\"> Robust KYC solutions help meet compliance frameworks and industry standards to avoid penalties or legal issues.<\/span><\/li><\/ul>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-e03467e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e03467e\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3b2eebe\" data-id=\"3b2eebe\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-bbf5fd4 elementor-widget elementor-widget-heading\" data-id=\"bbf5fd4\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Some common frauds that can be prevented with Video KYC<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b8328f1 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b8328f1\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8d745c4\" data-id=\"8d745c4\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-320d060 elementor-widget elementor-widget-text-editor\" data-id=\"320d060\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul><li style=\"font-weight: 400;\" aria-level=\"1\"><b>Identity Theft:<\/b><span style=\"font-weight: 400;\"> With Video KYC, individuals must present their original NID documents while visually verifying through live video, making it significantly harder for imposters to pass off stolen identities, as they cannot replicate the live interactions and physical appearance of the genuine individual.<\/span><\/li><\/ul><p><\/p><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><b>Impersonation<\/b><span style=\"font-weight: 400;\">: Fraudsters often attempt to impersonate legitimate customers during account opening or transaction processes. Video KYC adds an extra layer of authentication by verifying the customer&#8217;s identity in real time.<\/span><\/li><\/ul><p><\/p><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><b>Document Forgery:<\/b><span style=\"font-weight: 400;\"> Video KYC minimises the risk of document forgery by allowing agents to scrutinise the authenticity of documents during the live verification process and detect subtle signs of tampering or falsification that may go unnoticed in static scans.<\/span><\/li><\/ul><p><\/p><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><b>Account Takeover: <\/b><span style=\"font-weight: 400;\">Video KYC strengthens authentication procedures by visually confirming the identity of users before granting access to sensitive accounts. Thus preventing fraudsters from hijacking accounts through stolen credentials or social engineering tactics safeguarding customer assets and confidential information.<\/span><\/li><\/ul>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7296a29 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7296a29\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8d53b3e\" data-id=\"8d53b3e\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-19758cb elementor-widget elementor-widget-heading\" data-id=\"19758cb\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Video KYC Benefits for Banks, NBFCs, and Telecom Providers<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b2f3280 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b2f3280\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-0d63721\" data-id=\"0d63721\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1188f8b elementor-widget elementor-widget-text-editor\" data-id=\"1188f8b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Various industries can leverage Video KYC to streamline operations and enhance security. Banks and NBFCs benefit from remote identity verification for account opening and transaction processing, ensuring compliance with regulatory requirements while reducing paperwork and improving customer satisfaction. Telecommunication providers can use it for customer registration, ensuring KYC compliance and enhancing data security, leading to a smoother onboarding experience and increased customer loyalty. Insurance companies can integrate Video KYC into policy issuance processes, accelerating underwriting and reducing fraud risks.\u00a0<\/span><\/p><p><span style=\"font-weight: 400;\">E-commerce platforms can verify seller and buyer identities, preventing fraudulent activities and fostering trust within their marketplace. Across these sectors, Video KYC facilitates secure transactions, enhances compliance, and improves customer experience while reducing operational costs and mitigating fraud risks.<\/span><span style=\"font-weight: 400;\"><\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-270ead1 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"270ead1\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-73ffcb0\" data-id=\"73ffcb0\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0fdfa9e elementor-widget elementor-widget-heading\" data-id=\"0fdfa9e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Quick Checklist For A Streamlined Video KYC\n<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-0748a0e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"0748a0e\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a5ca8c2\" data-id=\"a5ca8c2\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-6338c58 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6338c58\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-c521190\" data-id=\"c521190\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-69d325e elementor-widget elementor-widget-text-editor\" data-id=\"69d325e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul><li style=\"font-weight: 400;\" aria-level=\"1\"><b>Utilising Advanced, Secure, and Intuitive Technology: <\/b><span style=\"font-weight: 400;\">Financial entities should adopt a user-friendly Video KYC platform that employs advanced technologies (facial recognition, liveness detection, OCR) and supports various devices and operating systems while ensuring end-to-end encryption to safeguard sensitive customer data.<\/span><\/li><\/ul><p><\/p><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><b>Making Video Calls Safe &amp; Secure: <\/b><span style=\"font-weight: 400;\">Strong encryption methods should be implemented to ensure secure video interactions, data privacy, and unauthorised access for the overall customer experience.<\/span><\/li><\/ul><p><\/p><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><b>Strengthening Compliance and Risk Management: <\/b><span style=\"font-weight: 400;\">Integration of video KYC with anti-money laundering (AML) solutions enables the detection and prevention of suspicious transactions and aids in identifying high-risk customers promptly.<\/span><\/li><\/ul><p><\/p><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><b>Consent-Driven Data Collection:<\/b><span style=\"font-weight: 400;\"> Prioritize customer privacy by obtaining explicit consent for collecting and processing personal information. Adherence to relevant data privacy regulations showcases a commitment to safeguarding customer data and fostering trust.<\/span><\/li><\/ul>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3116c52 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3116c52\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-02e7508\" data-id=\"02e7508\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c9c18d9 elementor-widget elementor-widget-heading\" data-id=\"c9c18d9\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Selecting the Right Video KYC Solution Provider<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-808256b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"808256b\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-96ac151\" data-id=\"96ac151\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a6edb79 elementor-widget elementor-widget-text-editor\" data-id=\"a6edb79\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Choosing a reliable and experienced video KYC solution provider is crucial to ensure all the above pointers and accommodate the business\u2019s unique needs and potential growth in the future. Choosing a solution compatible with the customer management systems and easily integrated with the existing onboarding workflows is imperative to ensure a cohesive and efficient process without causing many disruptions or delays.<\/span><\/p><p><\/p><p><span style=\"font-weight: 400;\">At AuthBridge, we offer a robust Video KYC solution that digitises customer onboarding journeys with end-to-end liveness detection, OCR, and geotagging capabilities, adding speed, scale and security to your customer onboarding process. Using AuthBridge\u2019s Video KYC solution for\u00a0 customer onboarding helps in &#8211;\u00a0\u00a0<\/span><\/p><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">saving operational costs by up to 70%,\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">reducing KYC turnaround time by up to 90%<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">ensuring an enhanced and secure customer experience<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">assessing suspicious transactions to manage compliance obligations effectively<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">implementing robust data protection measures, including encryption and secure storage of customer data, compliance with GDPR<\/span><\/li><\/ul><p><\/p><p><span style=\"font-weight: 400;\">Banks, NBFCs, mutual funds, insurance, logistics, telecom companies, mobile wallets and P2P marketplaces can use Video KYC to enhance customer experience and catch identity and financial frauds before onboarding customers.<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-f35c6fa elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f35c6fa\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-587ae68\" data-id=\"587ae68\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2c60a82 elementor-widget elementor-widget-text-editor\" data-id=\"2c60a82\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Selecting the right solution provider, ensuring compliance with regulations, and integrating the system with existing workflows contribute to a seamless and effective customer verification process. This, in turn, enhances customer satisfaction, reduces operational complexities, and strengthens the business&#8217;s overall security and compliance framework.<\/span><\/p><p><\/p><p><i><span style=\"font-weight: 400;\">To know more about our Video KYC Solution, talk to our solution expert today:\u00a0<\/span>https:\/\/authbridge.com\/staging\/contact-us\/\u00a0<\/i><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>In light of recent trends, there&#8217;s been a surge in prioritising user identification and verification across various domains, be it employees, gig workers, customers, or third parties. This heightened focus stems from the escalating instances of fraudulent activities, the proliferation of sophisticated tools and the dark web for malicious intents, [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":57074,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21],"tags":[],"class_list":["post-57069","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blogs"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Deep Dive into Video KYC\u00a0for Customer Onboarding &amp; Security<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Streamlining Customer Onboarding &amp; Security: A Deep Dive into Video KYC\u00a0\" \/>\n<meta property=\"og:description\" content=\"In light of recent trends, there&#8217;s been a surge in prioritising user identification and verification across various domains, be it employees, gig workers, customers, or third parties. This heightened focus stems from the escalating instances of fraudulent activities, the proliferation of sophisticated tools and the dark web for malicious intents, [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/authbridge.com\/staging\/resources\/blogs\/streamlining-customer-onboarding-security-a-deep-dive-into-video-kyc\/\" \/>\n<meta property=\"og:site_name\" content=\"AuthBridge\" \/>\n<meta property=\"article:published_time\" content=\"2024-02-26T10:08:37+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-27T06:43:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/authbridge.com\/staging\/wp-content\/uploads\/2024\/02\/Blog-Template_Video-KYC_1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Shivangi\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@authbridge\" \/>\n<meta name=\"twitter:site\" content=\"@authbridge\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Shivangi\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/authbridge.com\\\/staging\\\/resources\\\/blogs\\\/streamlining-customer-onboarding-security-a-deep-dive-into-video-kyc\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/authbridge.com\\\/staging\\\/resources\\\/blogs\\\/streamlining-customer-onboarding-security-a-deep-dive-into-video-kyc\\\/\"},\"author\":{\"name\":\"Shivangi\",\"@id\":\"https:\\\/\\\/authbridge.com\\\/staging\\\/#\\\/schema\\\/person\\\/018b88cec7f62fb62f7ee58be89b692d\"},\"headline\":\"Streamlining Customer Onboarding &amp; Security: A Deep Dive into Video KYC\u00a0\",\"datePublished\":\"2024-02-26T10:08:37+00:00\",\"dateModified\":\"2024-02-27T06:43:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/authbridge.com\\\/staging\\\/resources\\\/blogs\\\/streamlining-customer-onboarding-security-a-deep-dive-into-video-kyc\\\/\"},\"wordCount\":1675,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/authbridge.com\\\/staging\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/authbridge.com\\\/staging\\\/resources\\\/blogs\\\/streamlining-customer-onboarding-security-a-deep-dive-into-video-kyc\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/authbridge.com\\\/staging\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/Blog-Template_Video-KYC_1.jpg\",\"articleSection\":[\"Blogs\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/authbridge.com\\\/staging\\\/resources\\\/blogs\\\/streamlining-customer-onboarding-security-a-deep-dive-into-video-kyc\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/authbridge.com\\\/staging\\\/resources\\\/blogs\\\/streamlining-customer-onboarding-security-a-deep-dive-into-video-kyc\\\/\",\"url\":\"https:\\\/\\\/authbridge.com\\\/staging\\\/resources\\\/blogs\\\/streamlining-customer-onboarding-security-a-deep-dive-into-video-kyc\\\/\",\"name\":\"Deep Dive into Video KYC\u00a0for Customer Onboarding & Security\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/authbridge.com\\\/staging\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/authbridge.com\\\/staging\\\/resources\\\/blogs\\\/streamlining-customer-onboarding-security-a-deep-dive-into-video-kyc\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/authbridge.com\\\/staging\\\/resources\\\/blogs\\\/streamlining-customer-onboarding-security-a-deep-dive-into-video-kyc\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/authbridge.com\\\/staging\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/Blog-Template_Video-KYC_1.jpg\",\"datePublished\":\"2024-02-26T10:08:37+00:00\",\"dateModified\":\"2024-02-27T06:43:46+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/authbridge.com\\\/staging\\\/resources\\\/blogs\\\/streamlining-customer-onboarding-security-a-deep-dive-into-video-kyc\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/authbridge.com\\\/staging\\\/resources\\\/blogs\\\/streamlining-customer-onboarding-security-a-deep-dive-into-video-kyc\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/authbridge.com\\\/staging\\\/resources\\\/blogs\\\/streamlining-customer-onboarding-security-a-deep-dive-into-video-kyc\\\/#primaryimage\",\"url\":\"https:\\\/\\\/authbridge.com\\\/staging\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/Blog-Template_Video-KYC_1.jpg\",\"contentUrl\":\"https:\\\/\\\/authbridge.com\\\/staging\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/Blog-Template_Video-KYC_1.jpg\",\"width\":1200,\"height\":630},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/authbridge.com\\\/staging\\\/resources\\\/blogs\\\/streamlining-customer-onboarding-security-a-deep-dive-into-video-kyc\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/wptesting.authbridge.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Streamlining Customer Onboarding &amp; Security: A Deep Dive into Video KYC\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/authbridge.com\\\/staging\\\/#website\",\"url\":\"https:\\\/\\\/authbridge.com\\\/staging\\\/\",\"name\":\"AuthBridge\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/authbridge.com\\\/staging\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/authbridge.com\\\/staging\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/authbridge.com\\\/staging\\\/#organization\",\"name\":\"AuthBridge\",\"url\":\"https:\\\/\\\/authbridge.com\\\/staging\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/authbridge.com\\\/staging\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/authbridge.com\\\/staging\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/authbridge-site-icon.png\",\"contentUrl\":\"https:\\\/\\\/authbridge.com\\\/staging\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/authbridge-site-icon.png\",\"width\":1,\"height\":1,\"caption\":\"AuthBridge\"},\"image\":{\"@id\":\"https:\\\/\\\/authbridge.com\\\/staging\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/authbridge\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/authbridge.com\\\/staging\\\/#\\\/schema\\\/person\\\/018b88cec7f62fb62f7ee58be89b692d\",\"name\":\"Shivangi\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/authbridge.com\\\/staging\\\/wp-content\\\/litespeed\\\/avatar\\\/698a67d25c73f23ed879c5c6bbf45d5b.jpg?ver=1776259631\",\"url\":\"https:\\\/\\\/authbridge.com\\\/staging\\\/wp-content\\\/litespeed\\\/avatar\\\/698a67d25c73f23ed879c5c6bbf45d5b.jpg?ver=1776259631\",\"contentUrl\":\"https:\\\/\\\/authbridge.com\\\/staging\\\/wp-content\\\/litespeed\\\/avatar\\\/698a67d25c73f23ed879c5c6bbf45d5b.jpg?ver=1776259631\",\"caption\":\"Shivangi\"},\"url\":\"https:\\\/\\\/authbridge.com\\\/staging\\\/resources\\\/blogs\\\/author\\\/shivangi\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Deep Dive into Video KYC\u00a0for Customer Onboarding & Security","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Streamlining Customer Onboarding &amp; Security: A Deep Dive into Video KYC\u00a0","og_description":"In light of recent trends, there&#8217;s been a surge in prioritising user identification and verification across various domains, be it employees, gig workers, customers, or third parties. This heightened focus stems from the escalating instances of fraudulent activities, the proliferation of sophisticated tools and the dark web for malicious intents, [&hellip;]","og_url":"https:\/\/authbridge.com\/staging\/resources\/blogs\/streamlining-customer-onboarding-security-a-deep-dive-into-video-kyc\/","og_site_name":"AuthBridge","article_published_time":"2024-02-26T10:08:37+00:00","article_modified_time":"2024-02-27T06:43:46+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/authbridge.com\/staging\/wp-content\/uploads\/2024\/02\/Blog-Template_Video-KYC_1.jpg","type":"image\/jpeg"}],"author":"Shivangi","twitter_card":"summary_large_image","twitter_creator":"@authbridge","twitter_site":"@authbridge","twitter_misc":{"Written by":"Shivangi","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/authbridge.com\/staging\/resources\/blogs\/streamlining-customer-onboarding-security-a-deep-dive-into-video-kyc\/#article","isPartOf":{"@id":"https:\/\/authbridge.com\/staging\/resources\/blogs\/streamlining-customer-onboarding-security-a-deep-dive-into-video-kyc\/"},"author":{"name":"Shivangi","@id":"https:\/\/authbridge.com\/staging\/#\/schema\/person\/018b88cec7f62fb62f7ee58be89b692d"},"headline":"Streamlining Customer Onboarding &amp; Security: A Deep Dive into Video KYC\u00a0","datePublished":"2024-02-26T10:08:37+00:00","dateModified":"2024-02-27T06:43:46+00:00","mainEntityOfPage":{"@id":"https:\/\/authbridge.com\/staging\/resources\/blogs\/streamlining-customer-onboarding-security-a-deep-dive-into-video-kyc\/"},"wordCount":1675,"commentCount":0,"publisher":{"@id":"https:\/\/authbridge.com\/staging\/#organization"},"image":{"@id":"https:\/\/authbridge.com\/staging\/resources\/blogs\/streamlining-customer-onboarding-security-a-deep-dive-into-video-kyc\/#primaryimage"},"thumbnailUrl":"https:\/\/authbridge.com\/staging\/wp-content\/uploads\/2024\/02\/Blog-Template_Video-KYC_1.jpg","articleSection":["Blogs"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/authbridge.com\/staging\/resources\/blogs\/streamlining-customer-onboarding-security-a-deep-dive-into-video-kyc\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/authbridge.com\/staging\/resources\/blogs\/streamlining-customer-onboarding-security-a-deep-dive-into-video-kyc\/","url":"https:\/\/authbridge.com\/staging\/resources\/blogs\/streamlining-customer-onboarding-security-a-deep-dive-into-video-kyc\/","name":"Deep Dive into Video KYC\u00a0for Customer Onboarding & Security","isPartOf":{"@id":"https:\/\/authbridge.com\/staging\/#website"},"primaryImageOfPage":{"@id":"https:\/\/authbridge.com\/staging\/resources\/blogs\/streamlining-customer-onboarding-security-a-deep-dive-into-video-kyc\/#primaryimage"},"image":{"@id":"https:\/\/authbridge.com\/staging\/resources\/blogs\/streamlining-customer-onboarding-security-a-deep-dive-into-video-kyc\/#primaryimage"},"thumbnailUrl":"https:\/\/authbridge.com\/staging\/wp-content\/uploads\/2024\/02\/Blog-Template_Video-KYC_1.jpg","datePublished":"2024-02-26T10:08:37+00:00","dateModified":"2024-02-27T06:43:46+00:00","breadcrumb":{"@id":"https:\/\/authbridge.com\/staging\/resources\/blogs\/streamlining-customer-onboarding-security-a-deep-dive-into-video-kyc\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/authbridge.com\/staging\/resources\/blogs\/streamlining-customer-onboarding-security-a-deep-dive-into-video-kyc\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/authbridge.com\/staging\/resources\/blogs\/streamlining-customer-onboarding-security-a-deep-dive-into-video-kyc\/#primaryimage","url":"https:\/\/authbridge.com\/staging\/wp-content\/uploads\/2024\/02\/Blog-Template_Video-KYC_1.jpg","contentUrl":"https:\/\/authbridge.com\/staging\/wp-content\/uploads\/2024\/02\/Blog-Template_Video-KYC_1.jpg","width":1200,"height":630},{"@type":"BreadcrumbList","@id":"https:\/\/authbridge.com\/staging\/resources\/blogs\/streamlining-customer-onboarding-security-a-deep-dive-into-video-kyc\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/wptesting.authbridge.com\/"},{"@type":"ListItem","position":2,"name":"Streamlining Customer Onboarding &amp; Security: A Deep Dive into Video KYC\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/authbridge.com\/staging\/#website","url":"https:\/\/authbridge.com\/staging\/","name":"AuthBridge","description":"","publisher":{"@id":"https:\/\/authbridge.com\/staging\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/authbridge.com\/staging\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/authbridge.com\/staging\/#organization","name":"AuthBridge","url":"https:\/\/authbridge.com\/staging\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/authbridge.com\/staging\/#\/schema\/logo\/image\/","url":"https:\/\/authbridge.com\/staging\/wp-content\/uploads\/2023\/09\/authbridge-site-icon.png","contentUrl":"https:\/\/authbridge.com\/staging\/wp-content\/uploads\/2023\/09\/authbridge-site-icon.png","width":1,"height":1,"caption":"AuthBridge"},"image":{"@id":"https:\/\/authbridge.com\/staging\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/authbridge"]},{"@type":"Person","@id":"https:\/\/authbridge.com\/staging\/#\/schema\/person\/018b88cec7f62fb62f7ee58be89b692d","name":"Shivangi","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/authbridge.com\/staging\/wp-content\/litespeed\/avatar\/698a67d25c73f23ed879c5c6bbf45d5b.jpg?ver=1776259631","url":"https:\/\/authbridge.com\/staging\/wp-content\/litespeed\/avatar\/698a67d25c73f23ed879c5c6bbf45d5b.jpg?ver=1776259631","contentUrl":"https:\/\/authbridge.com\/staging\/wp-content\/litespeed\/avatar\/698a67d25c73f23ed879c5c6bbf45d5b.jpg?ver=1776259631","caption":"Shivangi"},"url":"https:\/\/authbridge.com\/staging\/resources\/blogs\/author\/shivangi\/"}]}},"_links":{"self":[{"href":"https:\/\/authbridge.com\/staging\/wp-json\/wp\/v2\/posts\/57069","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/authbridge.com\/staging\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/authbridge.com\/staging\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/authbridge.com\/staging\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/authbridge.com\/staging\/wp-json\/wp\/v2\/comments?post=57069"}],"version-history":[{"count":13,"href":"https:\/\/authbridge.com\/staging\/wp-json\/wp\/v2\/posts\/57069\/revisions"}],"predecessor-version":[{"id":57098,"href":"https:\/\/authbridge.com\/staging\/wp-json\/wp\/v2\/posts\/57069\/revisions\/57098"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/authbridge.com\/staging\/wp-json\/wp\/v2\/media\/57074"}],"wp:attachment":[{"href":"https:\/\/authbridge.com\/staging\/wp-json\/wp\/v2\/media?parent=57069"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/authbridge.com\/staging\/wp-json\/wp\/v2\/categories?post=57069"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/authbridge.com\/staging\/wp-json\/wp\/v2\/tags?post=57069"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}