The most advanced technologies to stay compliant to

KYC, AML, FATF, MAS, GDPR, FINMA, FCA and CySEC requirements

BASIS ID at the forefront of the Data Protection & Due Diligence Compliance

KYC / AML Compliance

BASIS ID services treat compliance as it’s core feature
icon

Compliant Worldwide

BASIS ID KYC service has been initially designed to satisfy various legal requirements and guidelines. We have thoroughly studied the AML/CTF legislation to provide a worldwide compatible solution and protect our clients by the highest standards in the field.

Flexible KYC Settings

The platform provides a flexible verification process allowing both automatic and manual modes. Manual mode may include post-moderation enabling our Clients to make the final decision on user onboarding. We are able to provide unique case-to-case solutions for any business.

Risk-free

Our infrastructure is built in full compliance with the global and local regulatory requirements including FATF, MAS, GDPR, FINMA, FCA, and CySEC. We are operating at the forefront of Data Protection and regulatory legislation all around the globe.

Ongoing Screening

Our system is constantly monitoring for the relevance of the existing users’ data. In case of any violation of the requirements you set for users, you will get notified of such and will be able to efficiently react with necessary actions taken.

icon
icon

Data Privacy Compliance

We have established a platform that allows us and our clients to be fully secure while working with sensitive personal data
icon

Consent to data processing

All of our services that require data processing will request your clients to give a specific consent to use of the provided data in an obvious form and with the links to the necessary documentation.

Data Storage & Localisation

We keep all the data encrypted at the Data Protection compliant Amazon servers, which are located in both Europe and Asia and considering the following factors: accessibility and data localisation requirements.

Breach Notification

In an unlikely event of a Data Breach we take the responsibility to detect it and take all the necessary actions within 72 hours as ruled by the GDRP.

The right to be forgotten

We have created a convenient widget, which is also available for our clients, that lets users practice their legal rights regarding their personal data. A user fills a simple form which will categorize their request, accordingly to the rights given by the GDPR, in order to effectively react to any kind of inquiries.

Know more about BASIS ID GDPR solution and how to make your business compliant

Security and Safeguards

We make sure to live up to the high standards of Data Protection and implement best practice solutions
icon

Secure data Storage

All personal data is stored encrypted on the cloud. As an integral part of our infrastructure, we use highly durable storage systems operated by Amazon which are designed for their only critical mission – data storage. We use TLS, SSL, HTTPS, AES, RSA, GnuPG, Lz4 and many other contemporary encrypting protocols.

Third-party testing

We conduct outsourced testings of our security measures on multiple levels and make sure our software is hack-proof in every known way by cooperating with the lead web security specialists.

Data Encryption

We encrypt every bit of data received or sent. For instance, data clusters interconnection is encrypted at least twice utilizing IPSec with an internal TLS. Connection to the Database is encrypted at 3 levels: IPSec, with integrated TLS TCP session sends requests and the data stored is encrypted with GnuPG. Even emails are sent via a secure TLS connections.

Vulnerability control

Our developers team performs regular stress tests of our systems to ensure every safeguard works as it is supposed to.

icon

Be up and running in minutes

Questions? Schedule some time to talk with one of our experts.
By submitting this form, you agree to the Privacy Policy of our website.