How the Core Identity Framework can help combat identity fraud

Share This Post

Share on facebook
Share on linkedin
Share on twitter
Share on email

In an era driven by rapid digital­ization, the tradi­tional approaches of face-to-face meetings and physical document validation are becoming less popular among companies to verify a customer’s identity.

Nowadays, electronic ID control is the method of choice.

However, this has led to increased vulner­a­bility to identity fraud due to the wealth of infor­mation available on social media and data aggre­gation platforms, as well as the increasing frequency of cyber­at­tacks targeting unsecured systems.

In this article, we explore how you can strengthen your practice’s anti-money laundering (AML) processes using a dedicated framework to help you stay prepared against identity threats.

Here’s what we cover:

Identity fraud in the digital age

Digital­ization of processes has undoubtedly accel­erated the efficiency of AML processes across accounting practices.

However, it is important for you as an accountant or accountant to recognize that with these benefits come new risks and vulner­a­bil­ities.

Identity fraud, in particular, is more prevalent in the digital age.

One notable example is the use of artificial intel­li­gence (AI), which is paving the way for deepfakes — sophis­ti­cated synthetic media that digitally alter appearance to convinc­ingly replace one person’s likeness with another.

While electronic methods of verifying a customer’s identity are useful, you should be cautious and consider whether the processes you have in place are robust enough to truly authen­ticate the identity.

Carrying out controls to combat money laundering

When it comes to attracting a new client to your practice, anti-money laundering regulators and profes­sional associ­a­tions expect you to be confident that you are dealing with someone who is genuine and who they say they are.

If you do this improperly, you could face fines, reputa­tional damage, and even a lawsuit.

The strategies you use to authen­ticate customers can vary depending on the nature of your inter­action — whether in-person or virtual — and the length of your relationship.

Each customer brings a unique context. And while it’s tempting to stick to a routine, it’s important to recognize that there is no one size fits all.

Need help making sure you’ve covered all the bases when vetting clients in your practice?

A framework created by us at Sage supports you in this.

What is the Core Identity Framework?

The Core Identity Framework is a method we developed to help you ensure that you have truly verified your customers’ identities.

The Core Identity Framework: A method for ensuring effective client verifi­cation

It includes the following:

  • Verifi­cation of residency: Can I prove that they live where they say they live? This confirms the correctness of the address you provided.
  • Authen­ticate documents: Have I seen a valid and original (authentic) copy of the ID document? Ensuring the authen­ticity and validity of the ID provided.
  • Verify identity: Is the person I am dealing with the person on this identi­fi­cation document? This is intended to ensure a complete match between the person and the infor­mation in the ID document presented.
  • Evidence documen­tation: Did I document all of this as evidence? Document any evidence you have so that you can present it during a practice safety visit if requested.

Our inves­ti­gation into how AML is managed in practice GoPro­posal has revealed a trend whereby many of our accoun­tants and bookkeepers are currently only addressing two or three of these four pillars.

By consis­tently adhering to the Core Identity Framework, you can build trust in your customer verifi­cation processes.

What to look for in an identity verification provider

When it comes to verifying customers, the landscape of identity verifi­cation solutions offers a range of options, each covering different levels of verifi­cation.

The choice that best suits your needs depends on a close exami­nation of your existing processes.

Here’s how to navigate these alter­na­tives depending on your circum­stances:

  1. Personal Inter­ac­tions: If you are attending in-person meetings for identity verifi­cation, a simpler electronic verifi­cation may be suffi­cient. However, ensuring documen­tation and safe storage of identity creden­tials is still a must.
  2. Virtual work settings: The transition to a virtual work environment brings with it a shift towards more compre­hensive electronic verifi­cation strategies. The lack of physical inter­ac­tions highlights the impor­tance of ensuring that any checks you conduct electron­i­cally are robust.

Using the Core Identity Framework in your verification process

Identity verifi­cation providers offer a number of different types of verifi­cation. Therefore, it is important to tie your decisions to the Core Identity Framework when deciding what works best with your processes.

If your chosen provider only addresses two or three core elements, it is imper­ative to address the remaining component in your AML processes indepen­dently.

For example, many companies choose to implement document verifi­cation, which involves capturing, storing and validating their customers’ identity documents and addresses.

This would score three out of four on the Core Identity Framework.

Even after completing this check, companies still need to confirm that the face matches the document presented, either through an in-person meeting or an online verifi­cation method.

You should always contact your practice assurance body for advice on whether online meetings are considered acceptable.

Another common practice in the industry is to perform a basic verifi­cation and background scan using a customer’s name, address and document number.

Although this confirms the authen­ticity of the document and the legit­imacy of the customer address, it is not enough.

In this scenario, a valid copy of the documen­tation has not been retained nor has the organi­zation confirmed a facial match to the submitted document and associated document number, resulting in a score of two out of four on the Core Identity Framework.

Clearly there is still room for improvement to achieve a more robust verifi­cation process.

The examples above show how the Core Identity Framework can serve as a guide to ensure that the approach you choose includes all important elements.

Final thoughts

Regardless of which level of electronic verifi­cation you choose, it is important to ensure that all four basic verifi­cation areas are covered.

The ability to achieve four out of four points within the Core Verifi­cation Framework depends on the specific processes and measures your practice imple­ments for identity verifi­cation.

If you can only achieve two or three within the framework, consider how you may need to adapt your processes to achieve all four.

Refer to your own identity verifi­cation practices and assess whether your current processes align with the four criteria outlined in the Core Verifi­cation Framework.

Identify any gaps or areas for improvement and make adjust­ments accord­ingly. It is an ongoing process and the goal is to contin­ually improve and adapt your proce­dures to ensure a thorough and secure identity verifi­cation system.

Related Posts