TMI BlogClarification on Know Your Client (KYC) Process and Use of Technology for KYCX X X X Extracts X X X X X X X X Extracts X X X X ..... d Use of Technology for KYC 1. Know Your Customer (KYC) and Customer Due Diligence (CDD) policies as part of KYC are the foundation of an effective Anti-Money Laundering process. The KYC process requires every SEBI registered intermediary (hereinafter referred to as 'RI') to collect and verify the Proof of Identity (PoI) and Proof of Address (PoA) from the investor. 2. The provisions as laid down under the Prevention of Money-Laundering Act, 2002, Prevention of Money-Laundering (Maintenance of Records) Rules, 2005, SEBI Master Circular on Anti Money Laundering (AML) dated October 15, 2019 and relevant KYC / AML circulars issued from time to time shall continue to remain applicable. Further, the SEBI registered intermediary shall continue ..... X X X X Extracts X X X X X X X X Extracts X X X X ..... here any law provides that information or any other matter shall be authenticated by affixing the signature or any document shall be signed or bear the signature of any person then such requirement shall be deemed to have been satisfied, if such information or matter is authenticated by means of a digital signature affixed in such manner as prescribed by the Central Government. Therefore, the eSign mechanism of Aadhaar shall be accepted in lieu of wet signature on the documents provided by the investor. Even the cropped signature affixed on the online KYC form under eSign shall also be accepted as valid signature. 4. In order to enable the Online KYC process for establishing account based relationship with the RI, Investor's KYC can be com ..... X X X X Extracts X X X X X X X X Extracts X X X X ..... en, provided the XML file or Aadhaar Secure QR Code generation date is not older than 3 days from the date of carrying out KYC. In terms of SEBI circular No. CIR/MIRSD/29/2016 dated January 22, 2016 the usage of Aadhaar is optional and purely on a voluntary basis by the investor. c. PAN is verified online using the Income Tax Database. d. Bank account details are verified by Penny Drop mechanism or any other mechanism using API of the Bank. (Explanation: based on bank details in the copy of the cancelled cheque provided by the investor, the money is deposited into the bank account of the investors to fetch the bank account details and name.) The name and bank details as obtained shall be verified with the information provided by investo ..... X X X X Extracts X X X X X X X X Extracts X X X X ..... ned copy / photograph of the same to the RI under eSign, or b. Affix online the cropped signature on the filled KYC form and submit the same to the RI under eSign. vii. The RI shall forward the KYC completion intimation letter through registered post/ speed post or courier, to the address of the investor in cases where the investor has given address other than as given in the OVD. In such cases of return of the intimation letter for wrong / incorrect address, addressee not available etc, no transactions shall be allowed in such account and intimation shall also sent to the Stock Exchange and Depository. viii. The original seen and verified requirement under SEBI circular no. MIRSD/SE/Cir-21/2011 dated October, 5 2011 for OVD would be ..... X X X X Extracts X X X X X X X X Extracts X X X X ..... sual interaction with the customer and the quality of the communication is adequate to allow identification of the customer beyond doubt. RI shall carry out the liveliness check in order to guard against spoofing and such other fraudulent manipulations. The RI shall before rolling out and periodically, carry out software and security audit and validation of their App. The RI may have additional safety and security features other than as prescribed above. 6. Feature for Video in Person Verification (VIPV) for Individuals - To enable ease of completing IPV of an investor, intermediary may undertake the VIPV of an individual investor through their App. The following process shall be adopted in this regard: i. Intermediary through their auth ..... X X X X Extracts X X X X X X X X Extracts X X X X
|