Digital Onboarding including contactless biometric authentication and verification.
Why is it important?
During challenging financial times fraud naturally rises and the fraudsters and getting smarter each time.
To combat that fraud, Legislation has to change and we need to stay ahead of the curve. Proposed changes from the Financial Intelligence Centre (FIC), changes in Anti Money Laundering (AML) legislation, KYC, POPI etc. mean we need to change the way we work and how we treat our customers.
FICA Compliance | eKYC

Together with our own internal web designers we have chosen to partner with KC Media Agency. We believe in using specialists. Sometimes you need to call on all your best resources to meet the demands of modern business and KC Media Agency are the best!
KC Media takes care of all our Graphic Design, Web Design, Social Media and ‘Business in a Box’ requirements.
The OCR engine is perfect for seamlessly reading and identifying ID Documents in real-time. We aim to automate as much of the onboarding process as possible. By reading the Identity document through OCR we reduce the need for manual input and the risk of error.
Our onboarding solutions can also extract the facial images and do a ‘selfie match’ with a ‘proof of life’ test to make sure we identify any potential spoof attacks.
The second part of our solution deals with securing all of the client data using leading edge triple-level encryption and PKI cryptography to ensure data confidentiality, integrity, and authenticity.
We can provide a ‘digital container’ that stores the dynamically encrypted biographical data, face image and fingerprint templates, thus allowing us to ‘Hide data in plain sight’. This also allows us to operate offline if poor connectivity is an issue.
The Digital Identity is locked and secured by the individual’s fingerprint (and or face) biometrics and can only be decoded upon the successful verification of the person’s contactless fingerprint using a smart device/cell phone.
When personal data is secured through advanced cryptography in this way, in the event of a data breach and personal information has been stolen it becomes completely useless to the criminal.
