Privacy and KYC Requirements: Navigating the Labyrinth
- Date:March 26, 2024
- Author(s):
- Jennifer Pitt
- Report Details: 15 pages, 8 graphics
- Research Topic(s):
- Cybersecurity
- PAID CONTENT
Overview
Privacy and security are at the forefront of everyone’s minds, especially as they relate to identity information and what financial institutions and other businesses should know about their customers. To address lacking federal privacy regulations, individual states are setting their own privacy standards. Beginning with California’s Consumer Privacy Protection Act, 13 states have enacted comprehensive privacy laws. Unfortunately, the ongoing adoption of varied state privacy laws are confusing to consumers and banks.
This Javelin Strategy & Research report examines how FIs can navigate this labyrinth, a challenging maze of consumer privacy concerns, confusing privacy laws, and regulations surrounding know-your-customer (KYC) data collection requirements. They can do this by combining real-time identity-proofing technology and transparency about what data is collected and why it is necessary to collect specific information.
Key questions discussed in this report:
- How can banks navigate the complicated maze of privacy and KYC requirements?
- How can banks use identity-proofing technology to minimize friction while still collecting necessary information to vet customers and mitigate financial crimes risks?
- How does privacy and security noncompliance affect banks and small businesses?
Companies Mentioned:
DoorDash, California Attorney General’s Office
Book a Meeting with the Author
Related content
The Understated Cyber Vulnerabilities of Wealth Management Clients
Phishing attacks remain the most pervasive and concerning for wealth clients, but cybersecurity risk as a whole is a growing worry for financial advisors, who feel increasingly ill...
The Hidden Enemy: Iran’s Cyberthreat to U.S. Banks
Disinformation is among the leading cyber risks predicted in the wake of the June 21 U.S. strikes on Iran’s nuclear program. On June 22, the Department of Homeland Security issued ...
Zero Trust Hinges on Cyber Strategy, Not Technology
Compliance will never equate to security, and zero trust will never hinge on technology. Zero trust is built and secured via a solid corporate culture and cybersecurity strategy th...
Make informed decisions in a digital financial world