The Pandora Papers: The Importance of Enhanced Customer Due Diligence for PEPs

PEPs Mitigating Risk After The Pandora Papers Jumio

Anti-money laundering (AML) starts with knowing your customer. Multiple leaks such as the Panama Papers, Paradise Papers and most recently the Pandora Papers show that politically exposed persons (PEPs) are at higher risk for corruption. PEP screening is critical for ensuring your business takes a risk-based approach and performs enhanced due diligence on high-risk customers…

What is a Risk-Based Approach to AML?

As the world has become more connected and reliant on technology, criminals have become more sophisticated. Narcotics and arms traffickers as well as terrorists rely on money laundering to disguise the sources of their illegal funds. And they use a range of tools and methods to get around regulations and through loopholes in the financial system. But…

COVID-19: A Call for Digital Transformation

COVID-19: A Call for Digital Trasformation

The COVID-19 outbreak is a tragedy that will have widespread and long-lasting implications for humanity and our global economy. As the coronavirus continues to spread around the world, more and more enterprises will miss their financial targets because of supply chain disruptions and dampened customer demand. It’s also unclear how long this pandemic will last,…

Rethinking eKYC for Digital Banking in Asia-Pacific

Rethinking eKYC in APAC

In recent years, we have witnessed accelerated growth in Asia’s digital banking sector. More fintechs and newly licensed virtual banks are coming to market to address the unbanked segment, while traditional banks are transforming to manage costs and achieve operational efficiency in this increasingly competitive landscape. However, digitization has also exposed businesses to new risks,…

Identification vs. Verification vs. Authentication vs. Authorization: Comparing Definitions & Key Differences

Comparing Identification vs. Verification vs. Authentication

Data breaches, compliance mandates, and identity theft have made it increasingly difficult for organizations and individuals to establish trust online. Yet, for those very same reasons, it’s more important than ever. From the baseline identification of a customer or user to the recurring authentication process of ensuring that the person logging into or using your…

Why States’ Unclaimed Property Websites are Becoming a Lucrative Target for Fraud

Unclaimed Property Fraud

There are literally billions of dollars — somewhere between $40 billion and $50 billion — of unclaimed property held by states. Each year, unclaimed or abandoned assets are turned over to each state’s Unclaimed Property divisions by financial institutions and businesses that lose contact with the owners of those assets. Each state’s treasury department serves…

Regtech: What It Is and What It Means for the Future of Financial Technology

What is Regtech?

What is regtech? Regulatory Technology is an emerging field that applies new technologies to manage the administration of regulatory requirements, and is considered a subset of fintech (technologies that make financial activities more efficient). Here’s how John Dwyer, senior research analyst at Celent, explains the growth of regtech. “By harnessing technology to improve and optimize…

How Jumio Uses AI for Automatic Recognition of ID Documents

AI & Automatic ID Recognition

Jumio recently announced the beta launch of Jumio Go, a fully automated identity verification solution. Jumio Go combines AI, OCR and certified liveness detection technologies to automatically extract ID document data and validate the user’s digital identity in real time. Jumio Go, along with Jumio’s entire suite of identity verification and authentication solutions, automatically performs…

Why KYC Is Essential to Security for Banking Institutions

The Hudson United Bank of New Jersey was one of the banks used by the airplane hijackers who perpetrated the deadliest attack ever on American soil on Sept. 11, 2001. According to the 9/11 Commission, money-laundering safeguards within the financial industry at the time were not designed to detect or disrupt the type of deposits,…