Know Your Customer (KYC) is the process of verifying the identity of individuals or business owners during account opening or merchant onboarding. KYC typically involves collecting and authenticating government-issued identification, proof of address, tax identification numbers, and other documentation to confirm who the customer is and assess whether they present financial crime risk.
KYC serves as the first line of defense against money laundering, fraud, and terrorist financing. Financial institutions, payment service providers (PSPs), acquirers, and marketplaces are legally required to implement KYC controls under anti-money laundering (AML) regulations such as the Bank Secrecy Act (BSA) in the United States, the EU's Fifth Anti-Money Laundering Directive (5AMLD), and similar frameworks globally.
Beyond regulatory compliance, effective KYC reduces downstream risk. Without proper identity verification at onboarding, organizations face:
We see KYC failures most often when organizations rely solely on document submission without validating authenticity, when they fail to screen against sanctions and watchlists, or when manual processes introduce delays and inconsistencies.
Implementing KYC is not straightforward. Risk teams face several recurring challenges:
In merchant acquiring specifically, KYC extends beyond the business entity to include Ultimate Beneficial Owners (UBOs) and Key Management Personnel (KMPs). Missing or incomplete UBO identification is a common finding in regulatory audits.
An effective KYC process balances regulatory requirements, fraud prevention, and operational efficiency.
We recommend the following approach:
Not all customers present the same risk. Use a risk-based approach that applies more stringent checks to higher-risk segments:
Risk factors include transaction volume, industry vertical (for example, high-risk merchant category codes such as adult content, nutraceuticals, or cryptocurrency), geographic location, and customer behavior during onboarding.
Relying on a single data point creates vulnerability. Strong KYC processes triangulate identity using:
For business customers, verify corporate identity through business registries (such as Companies House in the UK, the Secretary of State databases in the U.S., or equivalent sources globally). Cross-check business registration details, tax identifiers, and registered addresses. Merchant onboarding workflows should integrate these checks automatically.
KYC is incomplete without screening. Every customer and UBO must be checked against:
False positives are common. We typically see match rates of 5% to 15% in initial screening, with the majority being name collisions rather than true hits. Implement fuzzy matching with thresholds that balance sensitivity (catching real matches) with specificity (minimizing false alerts). Manual review queues must clearly present evidence and allow reviewers to document decisioning rationale.
KYC should not be a binary pass/fail gate. Build workflows that handle edge cases:
Define clear service-level agreements (SLAs) for each tier. We typically advise risk teams to target sub-60-second processing for automated approvals, under 4 hours for standard manual reviews, and 24 to 48 hours for enhanced due diligence cases.
KYC is not a one-time event. Customers change over time. Implement continuous KYC practices:
KYC is often viewed narrowly as a compliance requirement. In practice, it has broader implications for business performance:
For acquirers and PSPs, KYC also supports compliance with card scheme requirements. Visa and Mastercard have introduced standards (such as Mastercard Merchant Monitoring Program requirements) that explicitly require identity verification for merchants and UBOs. Failures in KYC can result in scheme fines or loss of processing privileges.
A PSP onboarded a merchant presenting as a small e-commerce business selling consumer electronics. The merchant submitted an LLC registration, a driver's license for the business owner, and a bank statement. Initial KYC checks passed: the documents appeared legitimate, and the individual was not on any sanctions lists.
Three months later, the merchant began processing high volumes of transactions for nutraceutical products (a high-risk merchant category code not disclosed at onboarding). Chargeback rates spiked to 4%, well above acceptable thresholds. A retrospective investigation revealed that the business owner had used a synthetic identity (a real Social Security number paired with a fabricated name and date of birth). The LLC was registered but had no genuine operating history.
The failure occurred because the PSP relied solely on document submission without corroborating identity through third-party databases, failed to verify the business had a legitimate online presence or customer base, and did not implement transaction monitoring that would have flagged the MCC mismatch earlier.
This case illustrates the importance of layered KYC controls: document verification, identity triangulation through multiple data sources, and continuous monitoring. Merchant underwriting should integrate both static checks at onboarding and behavioral analysis during the account lifecycle.
Ballerine provides an AI-powered risk intelligence platform that automates identity verification, document authentication, and sanctions screening for payment service providers, acquirers, marketplaces, and banks. The platform integrates with third-party identity databases, watchlist providers, and business registries to streamline KYC workflows while maintaining compliance with AML regulations.
Ballerine's case management tools allow risk teams to review flagged cases efficiently, document decisioning rationale, and maintain audit trails for regulatory examinations. The platform supports both individual (KYC) and business (KYB) verification, including Ultimate Beneficial Owner identification and background checks on Key Management Personnel.
By consolidating data from multiple sources into a single workflow, Ballerine reduces manual effort, accelerates onboarding times, and improves detection of fraudulent identities and high-risk applicants.
Reduced manual efforts
Improved review resolution time
Increase in detected fraud
