{"id":19131,"date":"2022-01-26T06:00:37","date_gmt":"2022-01-26T14:00:37","guid":{"rendered":"https:\/\/www.trulioo.com\/?p=19131"},"modified":"2023-07-31T23:56:27","modified_gmt":"2023-07-31T23:56:27","slug":"risk-based-identity-verification","status":"publish","type":"post","link":"https:\/\/www.trulioo.com\/blog\/identity-verification\/risk-based-identity-verification","title":{"rendered":"A Risk-Based Approach to Identity Verification"},"content":{"rendered":"<div class=\"bg-white\">\n    \n<div\n    class=\"relative video\"\n    x-data=\"{ playing: false, height: null }\"\n    :style=\"height &#038;&#038; 'height:' + height + 'px'\"\n>\n\t    <div\n        class=\"section aspect-video bg-center bg-cover\n               flex items-center justify-center cursor-pointer\n               px-0 box-content bg-blend-overlay\"\n        style=\"background-image:url(https:\/\/www.trulioo.com\/wp-content\/uploads\/2023\/01\/video-risk-based-approach-thumbnail.jpg);background-color:rgba(0, 0, 0, 0.3)\"\n        x-show=\"!playing\"\n        x-transition.opacity.duration.300ms\n        @click=\"\n            playing = true;\n            \/\/ To prevent layout shift when the poster disappears and iframe loads, temporarily set container height\n            height = $el.parentNode.offsetHeight;\n        \"\n        @key.enter=\"$el.click()\"\n        @key.space=\"$el.click()\"\n    >\n        <div class=\"video-play-btn bg-green-500 rounded-full w-[64px] sm:w-[72px] md:w-[100px] h-[64px] sm:h-[72px] md:h-[100px] p-4 pl-5 flex items-center justify-center\">\n\t\t\t<svg class=\"h-6 md:h-8 text-green-900\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewBox=\"0 0 30 30\"><path fill=\"currentColor\" d=\"M30 15a3 3 0 1 1-6 0 3 3 0 0 1 6 0Zm-8-4a3 3 0 1 1-6 0 3 3 0 0 1 6 0Zm0 8a3 3 0 1 1-6 0 3 3 0 0 1 6 0ZM14 7a3 3 0 1 1-6 0 3 3 0 0 1 6 0Zm0 8a3 3 0 1 1-6 0 3 3 0 0 1 6 0Zm0 8a3 3 0 1 1-6 0 3 3 0 0 1 6 0ZM6 3a3 3 0 1 1-6 0 3 3 0 0 1 6 0Zm0 8a3 3 0 1 1-6 0 3 3 0 0 1 6 0Zm0 8a3 3 0 1 1-6 0 3 3 0 0 1 6 0Zm0 8a3 3 0 1 1-6 0 3 3 0 0 1 6 0Z\"\/><\/svg>        <\/div>\n    <\/div>\n\n    <template x-if=\"playing\">\n        \t\t\t            <iframe\n                                class=\"section aspect-video opacity-0 transition px-0\"\n                src=\"https:\/\/www.youtube.com\/embed\/qdha7KBHxuc?autoplay=1&#038;enablejsapi=1\"\n                style=\"display: none\"\n                webkitallowfullscreen mozallowfullscreen allowfullscreen\n                allow=\"autoplay\"\n\n                x-effect=\"playing; setTimeout(function() {\n                    $el.style.display = 'block';\n                    $el.offsetHeight; \/\/ Reflow\n                    $el.style.opacity = '1';\n                    setTimeout(function() { height = null; }, 100);\n                }, 305)\"\n            ><\/iframe>\n            <\/template>\n<\/div>\n\n<\/div>\n\n\n<p>Regulators are increasingly turning toward a <a href=\"\/blog\/compliance\/risk-based-approach\">risk-based approach<\/a>, as opposed to prescriptive measures, for many areas of compliance. For example, the Financial Action Task Force (FATF), an inter-governmental body that sets international goals for Anti-Money Laundering (AML), states that \u201cthe risk-based approach is central to the effective implementation of the FATF Recommendations.\u201d<\/p>\n\n\n\n<p>The risk-based approach is also essential for identity verification, creating a powerful model to deliver the right solution. The video above examines the risk-based approach as it relates to identity verification. It\u2019s part of our video series<em>,&nbsp;<\/em><a href=\"\/blog\/identity-verification\/digital-identity-verification\">Buyer\u2019s Guide Series to Digital Identity Verification Solutions<\/a><em>,&nbsp;<\/em>to help you navigate the identity verification landscape.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-varying-risk-profiles\">Varying risk profiles<\/h2>\n\n\n\n<p>Every identity verification is different. The business, use case and customer are all different, so the level of risk for a verification varies. By using a risk-based approach, the method you use to verify a customer matches the risk level.<\/p>\n\n\n\n<p>Risk levels can change as technology, regulations, consumer behavior and criminal activities evolve. Optimizing the performance of your identity program by using flexible verification methods allows you to be agile \u2013\u2013 and adjust your approach as business needs change.<\/p>\n\n\n\n<p>If your business takes a risk-based approach to compliance, fraud, and trust and safety, you need an identity verification solution that\u2019s flexible and able to adapt.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-multiple-verification-methods\">Multiple verification methods<\/h2>\n\n\n\n<p>Numerous techniques can help verify an identity such as:<\/p>\n\n\n\n<ul>\n<li>Digital identity verification \u2013 comparing identity data to reliable and independent data sources<\/li>\n\n\n\n<li>ID document verification &#8211; capturing, analyzing and authenticating identity documents<\/li>\n\n\n\n<li>Biometrics \u2013 comparing biometric information such as face, voice or fingerprint to records<\/li>\n<\/ul>\n\n\n\n<p>Each verification method has its advantages. For example, <a href=\"\/solutions\/identity-verification\">digital identity verification<\/a> allows consumers to quickly and easily apply online or on a mobile device. For service providers, this technique satisfies the regulatory compliance and fraud prevention measures necessary for financial services and payment companies. An organization\u2019s bottom line also benefits from lower costs achieved through better processes and customer experiences by quicker, smoother onboarding.<\/p>\n\n\n\n<p><a href=\"\/solutions\/identity-verification\">ID document verification<\/a> recognizes different identity documents and performs comprehensive algorithmic-based checks on thousands of global document types. When you get a positive match on an ID, you then can have confidence the document is genuine and not a forgery. An authentic document, however, doesn\u2019t automatically imply identity verification. Someone could have a forged document with false identity information.<\/p>\n\n\n\n<p>Combining these methods, or adding in biometrics or another <a href=\"\/blog\/identity-verification\/multi-factor-authentication-solutions\">authentication layer<\/a> such as possession of a mobile device, enables you to check multiple facets of a customer\u2019s identity to reduce risk.<\/p>\n\n\n\n<p>In practice, matching the method to the risk level means creating custom verification workflows based on the type of customer and transaction.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-balancing-risk-and-speed\">Balancing risk and speed<\/h2>\n\n\n\n<p>Depending on the risk profile, it might be prudent to use numerous types of identity checks upon the initial onboarding. Or, perhaps a quick verification fits the specific profile better, allowing the customer to sign up and start transacting with a minimum of friction. As the profile changes due to customer activities or other signals, further identity checks can always be requested later.<\/p>\n\n\n\n<p>Effective onboarding processes balance risk and speed. If the process is unreasonably slow, complex and invasive, abandonment rates can go through the roof. But if you water down your verification process, you could expose your business to fraud and non-compliance.<\/p>\n\n\n\n<p>With a flexible, holistic identity verification solution, you can customize the verification workflow to fit the level of risk and minimize friction. Your new customer onboarding experience \u2013\u2013 the first tangible touchpoint with your business \u2013\u2013 can be a positive one, all while maintaining compliance, trust and safety.<\/p>\n","protected":false},"excerpt":{"rendered":"Regulators are increasingly turning toward a risk-based approach, as opposed to prescriptive measures, for many&#8230;","protected":false},"author":8,"featured_media":19132,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"om_disable_all_campaigns":false,"footnotes":""},"categories":[334],"post-types":[148],"post-topics":[131],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.1 (Yoast SEO v22.1) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>A Risk-Based Approach to Identity Verification<\/title>\n<meta name=\"description\" content=\"Every identity verification is different. By using a risk-based approach, the method you use to verify a customer matches the risk level.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.trulioo.com\/blog\/identity-verification\/risk-based-identity-verification\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"A Risk-Based Approach to Identity Verification\" \/>\n<meta property=\"og:description\" content=\"Every identity verification is different. By using a risk-based approach, the method you use to verify a customer matches the risk level.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.trulioo.com\/blog\/identity-verification\/risk-based-identity-verification\" \/>\n<meta property=\"og:site_name\" content=\"Trulioo\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/trulioo\" \/>\n<meta property=\"article:published_time\" content=\"2022-01-26T14:00:37+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-07-31T23:56:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.trulioo.com\/wp-content\/uploads\/2022\/01\/A-Risk-Based-Approach-to-Identity-Verification.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Paul Valkama\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@trulioo\" \/>\n<meta name=\"twitter:site\" content=\"@trulioo\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Paul Valkama\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.trulioo.com\/blog\/identity-verification\/risk-based-identity-verification#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.trulioo.com\/blog\/identity-verification\/risk-based-identity-verification\"},\"author\":{\"name\":\"Paul Valkama\",\"@id\":\"https:\/\/www.trulioo.com\/#\/schema\/person\/4dedbd41574b6b5754919a490ed4d5ae\"},\"headline\":\"A Risk-Based Approach to Identity Verification\",\"datePublished\":\"2022-01-26T14:00:37+00:00\",\"dateModified\":\"2023-07-31T23:56:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.trulioo.com\/blog\/identity-verification\/risk-based-identity-verification\"},\"wordCount\":601,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.trulioo.com\/#organization\"},\"articleSection\":[\"Identity Verification\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.trulioo.com\/blog\/identity-verification\/risk-based-identity-verification#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.trulioo.com\/blog\/identity-verification\/risk-based-identity-verification\",\"url\":\"https:\/\/www.trulioo.com\/blog\/identity-verification\/risk-based-identity-verification\",\"name\":\"A Risk-Based Approach to Identity Verification\",\"isPartOf\":{\"@id\":\"https:\/\/www.trulioo.com\/#website\"},\"datePublished\":\"2022-01-26T14:00:37+00:00\",\"dateModified\":\"2023-07-31T23:56:27+00:00\",\"description\":\"Every identity verification is different. By using a risk-based approach, the method you use to verify a customer matches the risk level.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.trulioo.com\/blog\/identity-verification\/risk-based-identity-verification#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.trulioo.com\/blog\/identity-verification\/risk-based-identity-verification\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.trulioo.com\/blog\/identity-verification\/risk-based-identity-verification#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.trulioo.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Identity Verification\",\"item\":\"https:\/\/www.trulioo.com\/post-topics\/identity-verification\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"A Risk-Based Approach to Identity Verification\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.trulioo.com\/#website\",\"url\":\"https:\/\/www.trulioo.com\/\",\"name\":\"Trulioo\",\"description\":\"Building trust online (online identity verification services)\",\"publisher\":{\"@id\":\"https:\/\/www.trulioo.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.trulioo.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.trulioo.com\/#organization\",\"name\":\"Trulioo\",\"url\":\"https:\/\/www.trulioo.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.trulioo.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.trulioo.com\/wp-content\/uploads\/2023\/01\/Trulioo-Wordmark-Dark-Green.png\",\"contentUrl\":\"https:\/\/www.trulioo.com\/wp-content\/uploads\/2023\/01\/Trulioo-Wordmark-Dark-Green.png\",\"width\":2784,\"height\":1464,\"caption\":\"Trulioo\"},\"image\":{\"@id\":\"https:\/\/www.trulioo.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/trulioo\",\"https:\/\/twitter.com\/trulioo\",\"https:\/\/www.linkedin.com\/company\/trulioo\",\"https:\/\/www.instagram.com\/trulioo_global\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.trulioo.com\/#\/schema\/person\/4dedbd41574b6b5754919a490ed4d5ae\",\"name\":\"Paul Valkama\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.trulioo.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/ae0ad041b53eb878badb2c5744ad4691?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/ae0ad041b53eb878badb2c5744ad4691?s=96&d=mm&r=g\",\"caption\":\"Paul Valkama\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"A Risk-Based Approach to Identity Verification","description":"Every identity verification is different. By using a risk-based approach, the method you use to verify a customer matches the risk level.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.trulioo.com\/blog\/identity-verification\/risk-based-identity-verification","og_locale":"en_US","og_type":"article","og_title":"A Risk-Based Approach to Identity Verification","og_description":"Every identity verification is different. By using a risk-based approach, the method you use to verify a customer matches the risk level.","og_url":"https:\/\/www.trulioo.com\/blog\/identity-verification\/risk-based-identity-verification","og_site_name":"Trulioo","article_publisher":"https:\/\/www.facebook.com\/trulioo","article_published_time":"2022-01-26T14:00:37+00:00","article_modified_time":"2023-07-31T23:56:27+00:00","og_image":[{"width":900,"height":600,"url":"https:\/\/www.trulioo.com\/wp-content\/uploads\/2022\/01\/A-Risk-Based-Approach-to-Identity-Verification.jpg","type":"image\/jpeg"}],"author":"Paul Valkama","twitter_card":"summary_large_image","twitter_creator":"@trulioo","twitter_site":"@trulioo","twitter_misc":{"Written by":"Paul Valkama","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.trulioo.com\/blog\/identity-verification\/risk-based-identity-verification#article","isPartOf":{"@id":"https:\/\/www.trulioo.com\/blog\/identity-verification\/risk-based-identity-verification"},"author":{"name":"Paul Valkama","@id":"https:\/\/www.trulioo.com\/#\/schema\/person\/4dedbd41574b6b5754919a490ed4d5ae"},"headline":"A Risk-Based Approach to Identity Verification","datePublished":"2022-01-26T14:00:37+00:00","dateModified":"2023-07-31T23:56:27+00:00","mainEntityOfPage":{"@id":"https:\/\/www.trulioo.com\/blog\/identity-verification\/risk-based-identity-verification"},"wordCount":601,"commentCount":0,"publisher":{"@id":"https:\/\/www.trulioo.com\/#organization"},"articleSection":["Identity Verification"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.trulioo.com\/blog\/identity-verification\/risk-based-identity-verification#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.trulioo.com\/blog\/identity-verification\/risk-based-identity-verification","url":"https:\/\/www.trulioo.com\/blog\/identity-verification\/risk-based-identity-verification","name":"A Risk-Based Approach to Identity Verification","isPartOf":{"@id":"https:\/\/www.trulioo.com\/#website"},"datePublished":"2022-01-26T14:00:37+00:00","dateModified":"2023-07-31T23:56:27+00:00","description":"Every identity verification is different. By using a risk-based approach, the method you use to verify a customer matches the risk level.","breadcrumb":{"@id":"https:\/\/www.trulioo.com\/blog\/identity-verification\/risk-based-identity-verification#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.trulioo.com\/blog\/identity-verification\/risk-based-identity-verification"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.trulioo.com\/blog\/identity-verification\/risk-based-identity-verification#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.trulioo.com\/"},{"@type":"ListItem","position":2,"name":"Identity Verification","item":"https:\/\/www.trulioo.com\/post-topics\/identity-verification"},{"@type":"ListItem","position":3,"name":"A Risk-Based Approach to Identity Verification"}]},{"@type":"WebSite","@id":"https:\/\/www.trulioo.com\/#website","url":"https:\/\/www.trulioo.com\/","name":"Trulioo","description":"Building trust online (online identity verification services)","publisher":{"@id":"https:\/\/www.trulioo.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.trulioo.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.trulioo.com\/#organization","name":"Trulioo","url":"https:\/\/www.trulioo.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.trulioo.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.trulioo.com\/wp-content\/uploads\/2023\/01\/Trulioo-Wordmark-Dark-Green.png","contentUrl":"https:\/\/www.trulioo.com\/wp-content\/uploads\/2023\/01\/Trulioo-Wordmark-Dark-Green.png","width":2784,"height":1464,"caption":"Trulioo"},"image":{"@id":"https:\/\/www.trulioo.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/trulioo","https:\/\/twitter.com\/trulioo","https:\/\/www.linkedin.com\/company\/trulioo","https:\/\/www.instagram.com\/trulioo_global\/"]},{"@type":"Person","@id":"https:\/\/www.trulioo.com\/#\/schema\/person\/4dedbd41574b6b5754919a490ed4d5ae","name":"Paul Valkama","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.trulioo.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/ae0ad041b53eb878badb2c5744ad4691?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ae0ad041b53eb878badb2c5744ad4691?s=96&d=mm&r=g","caption":"Paul Valkama"}}]}},"_links":{"self":[{"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/posts\/19131"}],"collection":[{"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/comments?post=19131"}],"version-history":[{"count":1,"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/posts\/19131\/revisions"}],"predecessor-version":[{"id":36315,"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/posts\/19131\/revisions\/36315"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/media\/19132"}],"wp:attachment":[{"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/media?parent=19131"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/categories?post=19131"},{"taxonomy":"post-types","embeddable":true,"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/post-types?post=19131"},{"taxonomy":"post-topics","embeddable":true,"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/post-topics?post=19131"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}