Join the 7/21 live chat & demo: How to turn KYB & KYC into your competitive advantage


What is eKYC?

Take a look at the different signals that eKYC can take advantage of and review the benefits that eKYC offers both businesses and their customers.

Read time:
Share this post
Table of contents
⚡ Key takeaways
  • Electronic KYC (eKYC) is the process of completing identity verification and other KYC requirements digitally.
  • eKYC can pull from a broader variety of data and signals than is typically available with traditional KYC, including active signals, third-party data, passive signals, and behavioral signals.
  • eKYC offers businesses increased processing speed, reduced workload, scalability, and fewer human errors. It offers end users convenience, speed, and privacy.

Around the world, governments require many businesses, such as financial institutions, to understand who their customers are. These policies are generally known as Know Your Customer (KYC) or customer due diligence (CDD), and are designed to identify and prevent instances of money laundering and other financial crimes.

The key requirement of KYC is identity verification (IDV) — ensuring that a customer or client is actually who they say they are.

IDV used to involve reviewing information submitted on physical forms and documents. But as the world has become increasingly digitized, KYC policies and practices have had to evolve in order to meet customer expectations as well as risks inherent in digital interactions. Electronic KYC (eKYC) is the result of these evolutions.

Below, we define eKYC, take a look at the different signals that eKYC can take advantage of, and review the benefits that eKYC offers both businesses and their customers.

What is eKYC?

Electronic KYC (eKYC) is the process of completing identity verification and other KYC requirements digitally. It can take different forms depending on your industry, use case, business needs, and even customers, but typically involves electronic forms, digital documents, and varying degrees of automation.

Like traditional KYC, eKYC typically occurs during account setup and then in an ongoing manner over time.

Free white paper
See how experts evaluate eKYC solutions

What are the different signals you can use when performing eKYC?

In many respects, eKYC can offer businesses a fuller picture of who their customer actually is.

That’s because eKYC can pull from a broader variety of data and signals than is typically available with traditional KYC. Whereas traditional KYC depends on active signals (e.g. user-submitted PII) and third-party data (e.g. watchlist reports), eKYC pairs this data with passive signals and behavioral signals that are difficult — if not impossible — to measure with manual review of physical forms and documentation.

Active signals

Active signals are signals that are provided directly by the individual. Usually, active signals include information such as:

  • Name
  • Address
  • Date of birth
  • Social Security number
  • Employment information/source of funds

Active signals also include any documents and photos that an individual may submit, such as a government-issued ID, bank statement, selfie, etc.

Additionally, with the move to eKYC, some governments, such as India and Estonia, have begun issuing forms of electronic identification (eIDs), which serve the same purpose as physical IDs.

While the concept of an eID has not yet gained traction at the federal level in the United States, it has been embraced by many states. Arizona, Colorado, Connecticut, Georgia, Hawaii, Iowa, Kentucky, Maryland, Mississippi, Ohio, Oklahoma, and Utah all accept digital driver’s licenses. Depending on the state, these digital licenses may be stored in a secure app or even in an Apple wallet.

Third-party data

Third party data are signals that are not provided, directly or indirectly, by the individual. Instead, they are provided by third parties, such as government entities, private businesses, and other authoritative and issuing databases.

Examples of these datasets can include:

Third-party data is often collected in the background during account creation, which is a good opportunity for businesses to enrich what they know about a customer without adding friction to the KYC process. Additionally, many businesses continuously cross-check customer profiles against these sources to ensure that the status of the individual has not changed.

Passive signals

Passive signals are provided by the device that the individual is using to complete the KYC process, typically in the background and without the individual even being aware of the fact. They are sometimes referred to as device signals. This data can include the individual’s:

  • IP address
  • Location data
  • Device fingerprint
  • Browser fingerprint
  • Various metadata
  • Whether or not the individual is using a VPN

Passive signals are an essential piece of eKYC, as they empower you to digitally verify and cross-check what the individual is actively telling you against the data that the device is passively providing. For example, if an individual says they’re in California but their IP address indicates they’re currently in Florida, you may want to dig a little deeper to ensure they’re actually who they say they are.

Behavioral signals

Behavioral signals are provided directly by the individual based on how they interact with an online form or application. Typically the individual is unaware of the fact that these behavioral signals are even being measured, quantified, or analyzed.

Behavioral signals can include:

  • Hesitation detection
  • Distraction events
  • Mouse clicks/keyboard strokes
  • The use of developer tools
  • The use of copy and paste
  • The use of autofill

Behavioral signals can be used for a variety of purposes. For example, behavioral data can help you determine whether a form or application is being completed by an actual human being or a bot. Likewise, it can aid in the detection of issues such as identity theft — for example, if a form is filled out in a suspicious  or unnatural way. As such, behavioral signals, like passive signals, are particularly valuable in the realm of eKYC.

What are the benefits of eKYC?

eKYC is beneficial for a number of reasons — largely because it allows for a higher degree of automation that simply isn’t possible when identity verification is completed by human personnel.

For companies, these benefits include:

  • Increased processing speed: As soon as customers submit their information, identities can be verified in seconds; much faster than manual review. This can help businesses reduce dropoffs and increase conversions.
  • Reduced workload: With less manual review necessary, financial institutions require fewer employees dedicated to KYC, allowing them to shift resources elsewhere.
  • Scalability: Because eKYC processes reduce your need to hire and train manual reviewers, it makes it easier for you to grow and scale your business. Likewise, the fact that eKYC happens 24/7 means that your business can continue operating even outside of normal business hours.
  • Fewer human errors: Fewer human touches reduces the risk of human error, allowing for more efficient workflows.

And for the end user, the benefits include:

  • Convenience: Individuals and businesses can fill out forms and applications without needing to scan physical documents, print physical forms, or visit a physical branch or office.
  • Speed of approval: Because electronic data can be reviewed automatically, customers enjoy faster approvals and account creation.
  • Privacy: When businesses embrace eKYC, it typically means that fewer actual human beings are reviewing sensitive data, because it’s done automatically by the system. This means customers experience greater privacy overall.

Customize your eKYC process for your business’s unique needs

As discussed above, eKYC can be supported by a variety of different signals. But which of these signals a business needs to collect, and when, will all vary depending on how risky a particular industry, use case, user, or transaction appears to be.

Here at Persona, we know how important it is to balance KYC compliance against a pleasant user experience. That’s why we have built progressive risk segmentation into our identity infrastructure.

Progressive risk segmentation allows you to modify a user’s experience depending on the signals you receive in real time during the verification process. This means that low-risk individuals and transactions can experience a more streamlined verification process, while higher-risk individuals and transactions include additional steps and more friction.

For example, during account creation, if behavioral data indicates that a form was completed using autofill or copy and paste capabilities, it may indicate identity theft. In order to ensure that the person completing the application is actually who they say they are, you may require them to take and upload a selfie, which you can then cross check against their government-issued ID.

Interested in learning more? Start for free or get a demo today.

Frequently asked questions

How are KYC and eKYC different?

Traditionally, KYC needed to be conducted in the physical space. This meant businesses would typically require a customer to submit physical forms and documents — and even potentially meet in person — in order to open an account.

eKYC is simply a digitized form of KYC, where customers complete forms and provide documents and other information digitally through applications or web portals.

Which countries are at the forefront of adopting eKYC?

Many countries around the world empower financial institutions to conduct their KYC practices electronically. That being said, Estonia and India are often considered to be at the forefront of the transition to eKYC.

Estonia’s national ID card has supported digital capabilities since 2001, making the country a model for many other countries looking to embrace eIDs. These eIDs are used by citizens to access hundreds of government services, and also serve commercial purposes.

India’s Aadhaar system, on the other hand, pairs a 12-digit number (similar to a Social Security number) with biometric signals such as the individual’s photo, fingerprints, and iris scan. This data is stored in a central database and accessed when an individual’s identity must be verified for government services.

Other countries which also make use of various forms of eID include:

  • Afghanistan
  • Bangladesh
  • Belgium
  • Bulgaria
  • Chile
  • Finland
  • Guatemala
  • Germany
  • India
  • Indonesia
  • Israel
  • Italy
  • Luxembourg
  • Netherlands
  • Nigeria
  • Morocco
  • Pakistan
  • Peru
  • Portugal
  • Poland
  • Romania
  • Estonia
  • Latvia
  • Lithuania
  • Spain
  • Slovakia
  • Malta
  • Uruguay

Many more countries and states have eID projects and proposals in the works.

Continue reading

Continue reading

Trust & safety in the age of AI
Trust & safety in the age of AI

Trust & safety in the age of AI

LLMs and other types of generative AI have the potential to destroy customer trust in your marketplace or platform. Learn more about the risks and solutions.

LLMs + fraud: How criminals use large language models to commit fraud
LLMs + fraud: How criminals use large language models to commit fraud

LLMs + fraud: How criminals use large language models to commit fraud

Large language models (LLMs) have a lot of potential to be used for fraud. Learn how fraudsters have added this and other AI programs to their toolkit.

DAC7 compliance: What is it, and who does it impact?
DAC7 compliance: What is it, and who does it impact?

DAC7 compliance: What is it, and who does it impact?

See how DAC7 impacts businesses, consumers, and governments, and understand what you need to know to stay compliant. Learn how Persona can help.

eIDV: A better way to protect your business and customers

eIDV: A better way to protect your business and customers

Discover how to prevent fraud, streamline business operations, and increase conversions by electronically verifying your customers’ identities.

The case for automated identity verification

The case for automated identity verification

Proper identity verification is your first line of defense.

Mobile KYC: How will it transform compliance?

Mobile KYC: How will it transform compliance?

Improve your verification processes with mobile KYC.

Ready to get started?

Get in touch or start exploring Persona today.