Accurately verify customers anywhere
Screen users against over 1100+ global sanctions, PEP, adverse media watchlists and 170K+ news sources.
Verify users against reliable government sources
Accurately match faces for user-friendly authentication
Access reliable records from Africa's business registries
Automatically spot anomalies to prevent fraud on your platform
Easily confirm bank account ownership
Validate phone number records in South Africa, Nigeria, Tanzania, Uganda and Kenya
Screen users against over 1100+ global sanctions, PEP, adverse media watchlists and 170K+ news sources.
Retrieve personal information from government records and match a selfie to official ID photo.
Match personal information against official government records.
Confirm the identity of an existing user.
Enhanced DocV authenticates and cross-references documents with government databases in one step.
Retrieve business records and stakeholder information from the official business registry
Identify users attempting to create multiple accounts using facial biometrics.
Retrieve personal information from official government records.
Verify the authenticity of an ID document and match a selfie to the ID card photo.
Unlocking Africa’s digital potential, Smile ID provides key definitions for navigating identity verification and compliance. This concise guide is essential for businesses aiming for secure growth across the continent.
Negative news or information about an individual or business. AML checks often include screening against adverse media to identify potential risks.
The ongoing process of adjusting compliance practices to keep up with changing regulations. This allows for a more efficient and user-friendly verification process, focusing stricter measures on higher-risk scenarios.
A business should follow a list of tasks and procedures to ensure they meet Anti-Money Laundering (AML) regulations. This checklist typically covers customer due diligence (CDD), transaction monitoring, suspicious activity reporting (SAR), and record-keeping requirements.
Criminal activities that involve the misuse or impersonation of someone's unique biological traits to gain unauthorised access or benefits.
A unique identification number for individual bank accounts in Nigeria. It is used to verify customer identity and prevent fraud.
Refers to the global effort to stop money flow to terrorist organisations and individuals. This includes various strategies employed by governments, financial institutions, and international organisations.
The rate at which customers stop using a service. A high churn rate can signal problems with your onboarding process or user experience.
Businesses that deal with a large amount of cash in their daily operations. Examples include casinos, pawn shops, and money service businesses. These businesses are considered at higher risk for money laundering due to the difficulty of tracing cash transactions.
The risk that a company will fail to comply with relevant laws and regulations, including AML regulations. Compliance risk can lead to financial penalties, reputational damage, and even criminal prosecution.
The ongoing process of verifying a user's identity throughout a session, not just at login. This is becoming increasingly important for high-risk activities.
Kenya's central bank and main financial regulatory body. It issues guidelines and enforces compliance with AML regulations.
Nigeria's central bank and apex monetary authority, established by the CBN Act of 1958. It is responsible for maintaining the country's external reserves, promoting monetary stability and a sound financial environment, and acting as a banker and financial adviser to the federal government.
When a customer disputes a legitimate purchase with their bank or credit card company, claiming they didn't make it or are unhappy with the service. This can be a real issue for businesses.
The Money laundering (ML) /Terrorist Financing (TF) risk is associated with the way a financial service is delivered (e.g., online banking, money transfer services). For example, internet-based transactions may have a higher risk of identity theft.
Authentication based on a user's knowledge of secret information, such as passwords or answers to security questions.
A process for verifying a customer's identity to comply with anti-money laundering and other regulations.
Documents used to verify the identity of a customer during Know Your Customer (KYC) procedures. These documents typically include proof of identity (e.g., passport, ID card) and proof of address (e.g., utility bill, bank statement).
A technique used by money launderers to move illegal funds through multiple financial transactions to make them appear legitimate. This makes it harder to trace the origin of the funds.
AML regulations can vary from country to country. Keeping up with changing regulations and ensuring compliance across different markets can be challenging for multinational businesses.
We are equipped to help you level up your KYC/AML compliance stack. Our team is ready to understand your needs, answer questions, and set up your account.