Digital KYC Process
X X X X Extracts X X X X
X X X X Extracts X X X X
....s authenticated Application of the Reporting Entities. B. The access of the Application shall be controlled by the Reporting Entities and it should be ensured that the same is not used by unauthorized persons. The Application shall be accessed only through login-id and password or Live OTP or Time OTP controlled mechanism given by Reporting Entities to its authorized officials. C. The client, fo....
X X X X Extracts X X X X
X X X X Extracts X X X X
.... is captured and no printed or video-graphed photograph of the client is captured. The background behind the client while capturing live photograph should be of white colour and no other person shall come into the frame while capturing the live photograph of the client. F. Similarly, the live photograph of the original officially valid document or proof of possession of Aadhaar where offline veri....
X X X X Extracts X X X X
X X X X Extracts X X X X
.... available, the details like name, gender, date of birth and address can be auto-populated by scanning the QR available on Aadhaar/e-Aadhaar. I. Once the above mentioned process is completed, a One Time Password (OTP) message containing the text that 'Please verify the details filled in form before sharing OTP' shall be sent to client's own mobile number. Upon successful validation of the OTP, it....
X X X X Extracts X X X X
X X X X Extracts X X X X
..... Upon successful OTP validation, it shall be treated as authorized officer's signature on the declaration. The live photograph of the authorized official shall also be captured in this authorized officer's declaration. K. Subsequent to all these activities, the Application shall give information about the completion of the process and submission of activation request to activation officer of the....