KYC Policy
Our KYC process is in compliance with the guidelines issued by RBI from time to time. Read on for the KYC & AML policy of DigiMoney.
KYC Policy
Our KYC process is in compliance with the guidelines issued by RBI from time to time. Read on for the KYC & AML policy of DigiMoney.
DigiMoney Finance Private Limited has been promoted with the primary purpose of making financial services more accessible to individuals and the small and medium businesses with limited access to financial services.
Reserve Bank of India has issued comprehensive guidelines on Know Your Customer (KYC) norms
and Anti-money Laundering (AML) standards and has advised all NBFCs to ensure that a proper policy framework on KYC and AML measures be formulated and put in place with the approval of the
Board.
Accordingly, in compliance with the guidelines issued by RBI from time to time, the following KYC & AML policy of DigiMoney Finance Private Limited (herein after referred to as ‘Company’) is approved by the Board of Directors.
This policy is applicable to all categories of products and services offered by the Company.
The above guidelines shall also apply to the branches.
1. Objective
Objective of RBI guidelines is to prevent NBFCs being used, intentionally or unintentionally by
criminal elements for money laundering activities. The guidelines also mandate making reasonable
efforts to determine the true identity and beneficial ownership of accounts, source of funds, the nature
of customer’s business, reasonableness of operations in the account in relation to the customer’s
business, etc, which in turn helps the Company to manage its risks prudently. Accordingly, the main
objective of this policy is to enable the Company to have positive identification of its customers.
2. Key Elements
KYC procedures also enable us to know / understand our customers and their financial dealings
better which in turn help them manage their risks prudently. We have framed our KYC policy
incorporating the following four key elements:
- Customer Acceptance Policy
- Customer Identification Procedure
- Monitoring of Transaction and
- Risk Management
- Any person or entity connected with a financial transaction or activity with a reporting entity and includes a person on whose behalf the person who is engaged in the transaction or activity is acting.
- A person or entity that maintains an account and/or has a business relationship with Company.
- The one on whose behalf the account is maintained (i.e. the beneficial owner).
- Beneficiaries of transactions conducted by professional intermediaries such as Stock Brokers, Company Secretaries, Chartered Accountants, Solicitors etc. as permitted under the law.
2.1. Customer Acceptance Policy
The Company shall follow the following norms while accepting and dealing with its customers:
- No account is opened in anonymous or fictitious/benami name.
- No account is opened where the Company is unable to apply appropriate CDD (Customer Due Diligence) measures, either due to non-cooperation of the customer or non-reliability of the documents / information furnished by the customer.
- No transaction or account-based relationship is undertaken without following the CDD procedure.
- The mandatory information to be sought for KYC purpose while opening an account and during the periodic updation, is specified.
- Optional/additional information is obtained with the explicit consent of the customer after the account is opened.
- The company shall apply the CDD procedure at the UCIC level. Thus, if an existing KYC compliant customer of a Company desires to open another account with the same Company, there shall be no need for a fresh CDD exercise.
- CDD Procedure is followed for all the joint account holders, while opening a joint account.
- Circumstances in which, a customer is permitted to act on behalf of another person/entity, is clearly spelt out.
- Suitable system is put in place to ensure that the identity of the customer does not match with any person or entity, whose name appears in the sanctions lists circulated by Reserve Bank of India.
- The customer profile contains information relating to customer’s identity, social/financial status, nature of business activity, information about his clients’ business and their location etc.
2.2 Customer identification procedure
Customer identification means identifying the customer and verifying his / her identity by using
reliable and independent source of documents, data or information to ensure that the customer is not
a fictitious person. The Company shall obtain sufficient information necessary to establish, to
its satisfaction, the identity of each customer and the purpose of the intended nature of
business relationship.
The Company shall undertake identification of customers in the following cases:
The Company will perform appropriate, specific and where necessary, Enhanced Due Diligence on its customers that is reasonably designed to know and verify the true identity of its customers and to detect and report instances of criminal activity, including money laundering or terrorist financing. The procedures, documentation, types of information obtained and levels of KYC due diligence to be performed will be based on the level of risk associated with the relationship (products, services, business processes, geographic locations) between the Company and the customer and the risk profile of the customer.
The Company shall take reasonable measures to ascertain and verify the true identity of all customers who transact with the Company. Each business process shall design and implement specific due diligence standards and procedures that are appropriate given the nature of the respective businesses, customers and the associated risks. Such standards and procedures shall include, at a minimum, the following elements.
The Company shall undertake identification of customers in the following cases:
-
(a) Commencement of an account-based relationship with the customer.
(b) When there is a doubt about the authenticity or adequacy of the customer identification data it has obtained.
The Company will perform appropriate, specific and where necessary, Enhanced Due Diligence on its customers that is reasonably designed to know and verify the true identity of its customers and to detect and report instances of criminal activity, including money laundering or terrorist financing. The procedures, documentation, types of information obtained and levels of KYC due diligence to be performed will be based on the level of risk associated with the relationship (products, services, business processes, geographic locations) between the Company and the customer and the risk profile of the customer.
The Company shall take reasonable measures to ascertain and verify the true identity of all customers who transact with the Company. Each business process shall design and implement specific due diligence standards and procedures that are appropriate given the nature of the respective businesses, customers and the associated risks. Such standards and procedures shall include, at a minimum, the following elements.
2.3. Monitoring of transaction
Ongoing monitoring is an essential element of effective KYC procedures. The Company can effectively control and reduce the risk only if it has an understanding of the normal and reasonable activity of the customer so that they have the means of identifying transactions that fall outside the regular pattern of activity. However, the extent of monitoring will depend on the risk sensitivity of the account. The different business divisions should pay special attention to all complex, unusually large transactions and all unusual patterns which have no apparent economic or visible lawful purpose. High risk accounts have to be subjected to intensified monitoring.
The Company shall put in place an appropriate software application / mechanism to throw alerts when the transactions are inconsistent with risk categorization and updated profile of customers.
Illustrative list of activities which is construed as suspicious transactions
The Company shall put in place an appropriate software application / mechanism to throw alerts when the transactions are inconsistent with risk categorization and updated profile of customers.
Illustrative list of activities which is construed as suspicious transactions
- Activities not consistent with the customer’s business, i.e. accounts with large volume of credits whereas the nature of business does not justify such credits.
- Any attempt to avoid Reporting/Record-keeping Requirements/provides insufficient / suspicious information.
- A customer who is reluctant to provide information needed for a mandatory report, to have the report filed or to proceed with a transaction after being informed that the report must be filed.
- Any individual or group that coerces/induces or attempts to coerce/induce the Company employee from not filing any report or any other forms.
- An account where there are several cash transactions below a specified threshold level to avoid filing of reports that may be necessary in case of transactions above the threshold level, as the customer intentionally splits the transaction into smaller amounts for the purpose of avoiding the threshold limit.
- Certain Employees of the Company arousing suspicion.
- An employee whose lavish lifestyle cannot be supported by his or her salary.
- Negligence of employees/wilful blindness is reported repeatedly.
- Multiple accounts under the same name
- Refuses to furnish details of source of funds by which initial contribution is made, sources of funds is doubtful etc;
- There are reasonable doubts over the real beneficiary of the loan
- Frequent requests for change of address
2.4. Risk Management
The Company has put in place appropriate procedures to ensure effective implementation of KYC guidelines. The implementation procedure covers proper management oversight, systems and
controls, segregation of duties, training and other related matters.
Company’s compliance function play a role in evaluating and ensuring adherence
to the KYC policies and procedures.
As a general rule, the compliance function also provides an independent evaluation of the
company’s own policies and procedures, including legal and regulatory requirements.
2.5 Risk Categorization
The Company has a system in place for periodical updation of customer identification data after
the account is opened. The periodicity of such updation is not less than once in five years in case of low
risk category customers and not less than once in two years in case of high and medium risk
categories.
All the customers under different product categories are categorized into low, medium and high risk based on their profile. The Credit manager while appraising the transaction and rendering his approval prepares the profile of the customer based on risk categorization. Based on the credit appraisal, customer’s background, nature and location of activity, country of origin, sources of funds, client profile,etc. Where the credit head believes that a particular customer falling under a category mentioned below is in his judgment falling in a different category, he may categorize the customer, so long as appropriate justification is provided in the customer file.
Indicative List of Risk Categorization:
Low Risk Category
Individuals (other than High Net Worth) and entities whose identities and sources of wealth can be easily identified and transactions in whose accounts by and large conform to the known profile is categorized as low risk. (In all probabilities the Company is doing and will continue to do their business with such category of customers)
For example People belonging to lower economic strata of the society whose accounts show small balances and low turnover
Medium & High Risk Category
Customers who are likely to pose a higher than average risk may be categorized as medium or high risk depending on customer’s background, nature and location of activity, country of origin, sources of funds and his client profile etc.
Illustrative examples are:
All the customers under different product categories are categorized into low, medium and high risk based on their profile. The Credit manager while appraising the transaction and rendering his approval prepares the profile of the customer based on risk categorization. Based on the credit appraisal, customer’s background, nature and location of activity, country of origin, sources of funds, client profile,etc. Where the credit head believes that a particular customer falling under a category mentioned below is in his judgment falling in a different category, he may categorize the customer, so long as appropriate justification is provided in the customer file.
Indicative List of Risk Categorization:
Low Risk Category
Individuals (other than High Net Worth) and entities whose identities and sources of wealth can be easily identified and transactions in whose accounts by and large conform to the known profile is categorized as low risk. (In all probabilities the Company is doing and will continue to do their business with such category of customers)
For example People belonging to lower economic strata of the society whose accounts show small balances and low turnover
Medium & High Risk Category
Customers who are likely to pose a higher than average risk may be categorized as medium or high risk depending on customer’s background, nature and location of activity, country of origin, sources of funds and his client profile etc.
Illustrative examples are:
-
1. Non-Resident customers
2. High Net worth Individuals
3. Trust, charities, NGO’s and Organization receiving donations
4. Companies having close family shareholding or beneficial ownership
5. Firms with ‘sleeping partners’
6. Politically Exposed Persons (PEPs) of Indian/Foreign Origin
7. Non face-to-face customers
8. Those with dubious reputation as per public information available
9. Accounts of bullion dealers and jewellers
3. Identification
CDD Procedure:
The company shall obtain the following information from an individual while establishing an
account-based relationship with:
3.1 Individual
3.2 Proprietary Firms
3.1 Individual
-
-
- a) Aadhaar Number (where an Aadhaar number has not been assigned to an individual, proof of application of enrolment for Aadhaar shall be obtained wherein the enrolment is not older than 6 months and in case PAN is not submitted, certified copy of an OVD containing details of identity and address and one recent photograph shall be obtained. At the time of receipt of the Aadhaar number, shall carry out, with the explicit consent of the customer, e-KYC authentication (biometric or OTP based) or Yes/No authentication)
-
-
-
- b) Permanent Account Number (PAN)
-
-
-
- c) Video of the Applicant
-
3.2 Proprietary Firms
-
-
- a) Aadhaar Number (where an Aadhaar number has not been assigned to an individual, proof of application of enrolment for Aadhaar shall be obtained wherein the enrolment is not older than 6 months and in case PAN is not submitted, certified copy of an OVD containing details of identity and address and one recent photograph shall be obtained. At the time of receipt of the Aadhaar number, shall carry out, with the explicit consent of the customer, e-KYC authentication (biometric or OTP based) or Yes/No authentication)
-
-
-
- b) Permanent Account Number (PAN)
-
-
-
- c) Registration Certificate
-
-
-
- d) Certificate/licence issued by the municipal authorities under Shop and Establishment Act.
-
-
-
- e) Sales and income tax returns.
-
-
-
- f) CST/VAT/ GST certificate (provisional/final).
-
-
-
- g) Certificate/registration document issued by Sales Tax/Service Tax/Professional Tax authorities.
-
-
-
- h) Complete Income Tax Return (not just the acknowledgement) in the name of the sole proprietor where the firm’s income is reflected, duly authenticated/acknowledged by the Income Tax authorities.
-
-
-
- i) Utility bills such as electricity, water, and landline telephone bills
-
-
-
- j) Telephone/Fax number/E-mail ID
-
-
-
- k) Recent color photograph
-
3.3 Company
a) Certificate of incorporation
b) Memorandum and Articles of Association.
c) A resolution from the Board of Directors and power of attorney granted to its managers, officers or employees to transact on its behalf.
d) Identification information i.e. Aadhaar Card and PAN Card in respect of managers, officers or employees holding an attorney to transact on its behalf.
3.4 Partnership Firms
b) Memorandum and Articles of Association.
c) A resolution from the Board of Directors and power of attorney granted to its managers, officers or employees to transact on its behalf.
d) Identification information i.e. Aadhaar Card and PAN Card in respect of managers, officers or employees holding an attorney to transact on its behalf.
3.4 Partnership Firms
-
- a) Registration certificate
-
- b) Partnership deed
-
- c) Identification information i.e. Aadhaar Card and PAN Card in respect of managers, officers or employees holding an attorney to transact on its behalf.
-
- a) Registration certificate
-
- b) Trust deed.
-
- c) Identification information i.e. Aadhaar Card and PAN Card in respect of managers, officers or
-
- employees holding an attorney to transact on its behalf.
-
- d) Unincorporated association or body of individuals:
-
- e) Resolution of the managing body of such association or body of individuals
-
- f) Power of attorney granted to him to transact on its behalf
-
- g) An officially valid document in respect of the person holding an attorney to transact on its behalf.
-
- h) Such information as may be required by the bank to collectively establish the legal existence of such an association or body of individuals.
-
- The Company also ensures that all the customers namely applicant, co applicants and guarantor has valid ID proof as prescribed above
- A certificate from the public authority (i.e) Gazette Officer of State or Central Govt., / Magistrate / MRO / VRO / Gram Panchayat Sarpanch / notary public.
- In lieu of Identity proof Notarized copy of Marriage certificate with the applicant photograph.
- In lieu of address proof
- Rental agreement along with rent receipt and utility bill of the Landlord.
- In case the customer has a temporary address being a transit arrangement provided by real estate builder – Allotment letter issued by the builder plus permanent address proof
- In deserving cases where there is no address proof for one of the applicants or guarantors, an affidavit signed by Close Relative (only in case of spouse, parents or children) confirming that the co applicant / guarantor is staying together in the same address.
The Credit Head of Company jointly with the concerned Sales Head has further delegated the approval powers to accept the above documents to credit managers, as they may deem fit and necessary, in this regard.
In the event of any genuine reason for non availability of any of the prescribed documents or to approve any deviations for change in the documents prescribed under this policy, the Credit Head jointly with the Sales Head considers approving any other document not stated above based on the product, market requirements and also on the merits of the case.
4. Verification
As part of the Credit Policy of the Company, documents and implemented appropriate risk based procedures designed to verify that it can form a reasonable belief that it knows the true identity of its customers. Verification of customer identity should occur before transacting with the customer. The Company describes the acceptable methods of verification of customer identity, which includes verification through documents or non documentary verification methods that are appropriate and the associated risks.
4.1 Verification through documents:
These documents may include, but are not limited to the list of documents that can be accepted as proof of identity and address from customers by the Company as provided in annexure to this policy. These are appropriately covered in the Credit Policy of the Company.
The Company also accepts physical Aadhaar card / letter issued by UIDAI containing details of name, address and Aadhaar number received through post is also accepted as an ‘Officially Valid Document’.
As per RBI instruction the Company also downloads e-Aadhaar from UIDAI website as an officially valid document subject to the following:
4.1 Verification through documents:
These documents may include, but are not limited to the list of documents that can be accepted as proof of identity and address from customers by the Company as provided in annexure to this policy. These are appropriately covered in the Credit Policy of the Company.
The Company also accepts physical Aadhaar card / letter issued by UIDAI containing details of name, address and Aadhaar number received through post is also accepted as an ‘Officially Valid Document’.
As per RBI instruction the Company also downloads e-Aadhaar from UIDAI website as an officially valid document subject to the following:
- a) If the prospective customer knows only his / her Aadhaar number, the Company needs to print the prospective customer’s e-Aadhaar letter in the company directly from the UIDAI portal; or adopt eKYC procedure as mentioned below.
- b) If the prospective customer carries a copy of the e-Aadhaar downloaded elsewhere, the Company prints the prospective customer’s e-Aadhaar letter directly from the UIDAI portal; or adopt e-KYC procedure as mentioned below.
- A. Verification through non-documentary methods:
- 1. Contacting or visiting a customer
- 2. Independently verifying the customer’s identity through the comparison of information provided by the customer with information obtained from a consumer reporting agency, public database, or other source
- 3. Checking references with other financial institutions; or
- 4. Obtaining a financial statement.
- B. Additional verification procedures. The business process verification procedures of the Company also address the following situations where:
- 1. A person is unable to present an unexpired government-issued identification document that bears a photograph or similar safeguard.
- 2. The sales executive is not familiar with the documents presented.
- 3. Where the sales executive is otherwise presented with circumstances that increase the risk that it will be unable to verify the true identity of a customer through documents; and
- 4. If the sales executive cannot verify the identity of a customer that is other than an individual, it may be necessary to obtain information about persons with authority or control over such account, including signatories, in order to verify the customer’s identity.
5. Maintenance of records of transaction & identity
As unlikely as it will be in the Company’s case, due to its focus on lower income families, the
company has a system of maintaining proper record of transactions prescribed under Rule 3, of the
Prevention of Money-Laundering and value of transactions, the procedure and manner of maintaining
and verification and maintenance of records of the identity of the clients of the Banking Companies,
Financial Institutions and Intermediaries) Rules, 2005, as mentioned below:
- All cash transactions of the value of more than rupees ten lakh or its equivalent in foreign currency.
- All series of cash transactions integrally connected to each other which have been valued below rupees ten lakh or its equivalent in foreign currency where such series of transactions have taken place within a month and the aggregate value of such transactions exceeds rupees ten lakh
- All cash transactions, where forged or counterfeit currency notes or bank notes have been used as genuine and where any forgery of a valuable security has taken place.
- All suspicious transactions whether or not made in cash and by way of as mentioned in the Rules
- the nature of the transactions
- the amount of the transaction and the currency in which it was denominated
- the date on which the transaction was conducted;
- the parties to the transaction.
6. enhanced due diligence
The company is primarily engaged in SME and needy individuals finance requirements. It does not
deal with such category of customers who could pose a potential high risk of money laundering, terrorist
financing or political corruption and are determined to warrant enhanced scrutiny. The existing credit
policies of the company in respect of its various businesses ensure that the company is not transacting
with such high risk customers.
The company shall conduct Enhanced Due Diligence in connection with all customers or accounts that are determined to pose a potential high risk and are determined to warrant enhanced scrutiny. The Company has established appropriate standards, methodology and procedures for conducting Enhanced Due Diligence, which shall involve conducting appropriate additional due diligence or investigative actions beyond what is required by standard KYC due diligence. Enhanced Due Diligence shall be coordinated and performed by the company.
The following are the indicative list where the risk perception of a customer which is considered higher:
The Company shall implement procedures for providing customers with adequate notice that the Company is requesting information and taking actions in order to verify their identity. Each business process shall determine the appropriate manner to deliver the notice, which shall be reasonably designed to ensure that the customer is able to view or is otherwise given such notice prior to account opening.
Existing Customer: The requirements of the earlier sections are not applicable to accounts opened by existing customers,provided that the business process has previously verified the identity of the customer and the business process continues to have a reasonable belief that it knows the true identity of the customer. Further,transactions in existing accounts should be continuously monitored and any unusual pattern in the operation of the account should trigger a review of the due diligence measures.
Reliance on third party due diligence: The company shall not on rely on third party due diligence.
The company shall conduct Enhanced Due Diligence in connection with all customers or accounts that are determined to pose a potential high risk and are determined to warrant enhanced scrutiny. The Company has established appropriate standards, methodology and procedures for conducting Enhanced Due Diligence, which shall involve conducting appropriate additional due diligence or investigative actions beyond what is required by standard KYC due diligence. Enhanced Due Diligence shall be coordinated and performed by the company.
The following are the indicative list where the risk perception of a customer which is considered higher:
-
a. Customers requesting for frequent change of address/contact details.
b. Sudden change in the loan account activity of the customers.
c. Frequent closure and opening of loan accounts by the customers.
The Company shall implement procedures for providing customers with adequate notice that the Company is requesting information and taking actions in order to verify their identity. Each business process shall determine the appropriate manner to deliver the notice, which shall be reasonably designed to ensure that the customer is able to view or is otherwise given such notice prior to account opening.
Existing Customer: The requirements of the earlier sections are not applicable to accounts opened by existing customers,provided that the business process has previously verified the identity of the customer and the business process continues to have a reasonable belief that it knows the true identity of the customer. Further,transactions in existing accounts should be continuously monitored and any unusual pattern in the operation of the account should trigger a review of the due diligence measures.
Reliance on third party due diligence: The company shall not on rely on third party due diligence.
7. appointment of designated director / principal officer
Gorav Gupta will be responsible for ensuring overall compliance as required under PMLA Act and the Rules.
Girinath Davey has been appointed as Principal Officer and shall be responsible for furnishing of information to FIU-IND.
As per the RBI guidelines, the Principal Officer is located at our corporate office and is responsible for monitoring and reporting of all transactions and sharing of information as required under the law. He maintains a close liaison with enforcement agencies, other NBFCs and any other institution which are involved in the fight against money laundering and combating financing of terrorism.
Girinath Davey has been appointed as Principal Officer and shall be responsible for furnishing of information to FIU-IND.
As per the RBI guidelines, the Principal Officer is located at our corporate office and is responsible for monitoring and reporting of all transactions and sharing of information as required under the law. He maintains a close liaison with enforcement agencies, other NBFCs and any other institution which are involved in the fight against money laundering and combating financing of terrorism.
8. EKYC
E-KYC authentication facility as defined in Aadhaar (Authentication) Regulations, 2016, means a type of authentication facility in which the biometric information and/or OTP and Aadhaar number securely submitted with the consent of the Aadhaar number holder through a requesting entity, is matched against the data available in the CIDR, and the Authority returns a digitally signed response containing e-KYC data along with other technical details related to the authentication transaction.