KYC

KYC

Our KYC solutions enable organizations to identify their customers quickly, safely, and fully in accordance with regulations.

We support the collection and verification of customer data, including identity documents, address information, and payment details, ensuring seamless onboarding and guaranteed compliance.

Our KYC solutions enable organizations to quickly, safely, and fully identify their customers according to regulations.

We support the collection and verification of customer data, including identity documents, address information, and payment details, ensuring seamless onboarding and compliance.

KYC

Our KYC solutions enable organizations to quickly, safely, and fully identify their customers according to regulations.

We support the collection and verification of customer data, including identity documents, address information, and payment details, ensuring seamless onboarding and compliance.

Bluem is a KYC- verification- and transaction-factory

Bluem is a KYC- verification- and transaction-factory

Bluem is a KYC- verification- and transaction-factory

Are these recognizable KYC issues?

Are these recognizable KYC issues?

Are these recognizable KYC issues?

  • How do you ensure that all required personal data is collected and efficiently and automatically stored in a customer system?

  • How do you prevent data pollution or data omissions? Are all customer profiles complete?

  • Is the fraud protection still adequate considering the enhanced technological capabilities of fraudsters?

  • Does our KYC process still meet the tightened requirements of regulators?

  • Our KYC process is time-consuming and costly; how can we automate it in a customer-friendly manner?

Via an API, you can access any Bluem KYC service online. Bluem is essentially a real-time transaction factory for KYC data sources and verification methods that a party needs nationally and internationally to work efficiently, fraud-resistant, and compliant for customers both nationally and internationally.

Bluem is a KYC specialist and can advise your organization on legal grounds for KYC, potential data sources, and associated APIs.

Via an API, you can access any Bluem KYC service online. Bluem is a real-time transaction factory for KYC data sources and verification methods that a company needs nationally and internationally to work efficiently, fraud-proof, and compliant for customers nationally and internationally.
Bluem is a KYC specialist and can advise your organization on legal grounds for KYC, potential data sources, and associated APIs.

Through an API, you can call any Bluem KYC service online. Bluem is essentially a real-time transaction factory for KYC data sources and verification methods that an entity needs nationally and internationally to work efficiently, fraud-resistant, and compliant for clients both nationally and internationally.

Bluem is a KYC specialist and can advise your organization on legal foundations for KYC, potential data sources, and associated APIs.

Legal basis for KYC (Know Your Customer) in NL and EU

Legal basis for KYC (Know Your Customer) in NL and EU

Legal basis for KYC (Know Your Customer) in NL and EU

KYC is not a standalone law, but a mandatory application of various national and European laws and regulations. The core responsibilities of KYC: customer identification, verification, risk assessment, and monitoring are outlined in:

KYC is not a standalone law, but a mandatory application of various national and European laws and regulations. The core responsibilities of KYC: customer identification, verification, risk assessment, and monitoring are outlined in:

KYC is not a standalone law, but a mandatory application of various national and European laws and regulations. The core responsibilities of KYC: customer identification, verification, risk assessment, and monitoring are outlined in:

  • A. AMLD - Anti-Money Laundering and Counter-Terrorism Financing Act

    A. AMLD - Anti-Money Laundering and Counter-Terrorism Financing Act

    A. AMLD - Anti-Money Laundering and Counter-Terrorism Financing Act

    Application: banks, insurers, investment institutions, leasing companies, fintechs, payment institutions, consumer credit providers, etc.

    Application: banks, insurers, investment institutions, leasing companies, fintechs, payment institutions, consumer credit providers, etc.

    Application: banks, insurers, investment institutions, leasing companies, fintechs, payment institutions, consumer credit providers, etc.

    KYC obligations under the Wwft:

    KYC obligations under the Wwft:
    KYC obligations under the Wwft:
    • • Customer and UBOs (Ultimate Beneficial Owners) identification and verification

    • • Determine the purpose and nature of the business relationship

    • • Risk-oriented client research (Customer Due Diligence)

    • • Ongoing monitoring and reassessment of customer relationships

    • • Identifying and reporting unusual transactions (to FIU-NL)

    Articles 3 to 9 of the Wwft clearly outline the KYC requirements.

    Articles 3 to 9 of the Wwft clearly outline the KYC requirements.
    Articles 3 to 9 of the Wwft clearly outline the KYC requirements.
  • B. Sanctions Act 1977 (including EU Sanctions Regulations)

    B. Sanctions Act 1977 (including EU Sanctions Regulations)

    B. Sanctions Act 1977 (including EU Sanctions Regulations)

    Application: all financial institutions and service providers

    Application: all financial institutions and service providers

    Application: all financial institutions and service providers

    • • Application: all financial institutions and service providers

    • • Mandatory real-time sanctions list checks during onboarding and monitoring.

    • • PEP checks (Politically Exposed Persons) are partly covered here.

  • C. AVG / GDPR - General Data Protection Regulation

    C. AVG / GDPR - General Data Protection Regulation

    C. AVG / GDPR - General Data Protection Regulation

    Application: all parties processing personal data, including KYC providers

    Application: all parties processing personal data, including KYC providers

    Application: all parties processing personal data, including KYC providers

    • • Personal data may only be processed if it is necessary and based on a legal basis (such as the Wwft).

    • • Requirements for data minimization, data security (privacy by design/default), and retention periods.

    • • Clear obligation to provide information and obtain consent where necessary (e.g., for data sharing outside the EEA).

  • D. Financial Supervision Act (Wft)

    D. Financial Supervision Act (Wft)

    D. Financial Supervision Act (Wft)

    Application: all licensed financial institutions

    Application: all licensed financial institutions

    Application: all licensed financial institutions

    • • Rules for controlled and sound business operations (art. 3:10 Wft)

    • • Controlled customer acceptance processes are explicitly required.

    • • Supervision by AFM and DNB.

  • E. European Anti-Money Laundering Directives (AMLD)

    E. European Anti-Money Laundering Directives (AMLD)

    E. European Anti-Money Laundering Directives (AMLD)

    Application: incorporation into national legislation

    Application: incorporation into national legislation

    Application: incorporation into national legislation

    • • 4th AMLD → foundation for risk-based CDD

    • • 5th AMLD → expansion of UBO registers, digital identification

    • • 6th AMLD → criminalization of aiding and abetting money laundering

    The AMLDs are the EU frameworks implemented in the Netherlands through the Wwft.

    The AMLDs are the EU frameworks implemented in the Netherlands through the Wwft.
    The AMLDs are the EU frameworks implemented in the Netherlands through the Wwft.

Appropriate data sources & verification methods in KYC processes

Appropriate data sources & verification methods in KYC processes

Appropriate data sources & verification methods in KYC processes

The data sources listed below support the fully compliant setup of a KYC process, provided they are used in a lawful, purpose-driven, and secure manner:

The data sources listed below support the fully compliant setup of a KYC process, provided they are used in a lawful, purpose-driven, and secure manner:

The data sources listed below support the fully compliant setup of a KYC process, provided they are used in a lawful, purpose-driven, and secure manner:

Source/Service
Application in KYC
iDIN

Identification via banking details, Wwft-compliant ID

okID ID-verification

Verification of ID document authenticity (NFC/AI)

VIS-check

Check for reported stolen/lost ID (police/VIS)

IBAN Name Check

Identity verification via bank account

Address validation

Verification against BRP / official registers

2FA (SMS/email)

Additional security in authentication & customer access

Budget check (e.g., NIBUD)

Assessment of payment capacity, especially in credit lending

CCBR check

Central Credit Register (Belgian Register)

CIR-check

Central information register (e.g., non-life insurance)

BKR-check

Consumer Creditworthiness (NL)

All these Bluem checks can be called in real-time via APIs within a standardized KYC framework, as offered by Bluem.

All these Bluem checks can be called in real-time via APIs within a standardized KYC framework, as offered by Bluem.

All these Bluem checks can be called in real-time via APIs within a standardized KYC framework, as offered by Bluem.

Conclusion: Bluem as a compliant KYC engine

Conclusion: Bluem as a compliant KYC engine

Conclusion: Bluem as a compliant KYC engine

Take advantage of Bluem's fully automated, modular KYC platform that complies with all current laws and regulations (Wwft, AVG, Wft, Sanctions Act), by combining real-time verification services, risk management, fraud prevention, and data protection. Suitable for both national and international clients.

Take advantage of Bluem's fully automated, modular KYC platform that complies with all current laws and regulations (Wwft, AVG, Wft, Sanctions Act), by combining real-time verification services, risk management, fraud prevention, and data protection. Suitable for both national and international clients.

Take advantage of Bluem's fully automated, modular KYC platform that complies with all current laws and regulations (Wwft, AVG, Wft, Sanctions Act), by combining real-time verification services, risk management, fraud prevention, and data protection. Suitable for both national and international clients.

Do you also want to verify customers faster, digitalize KYC processes, and enhance your reliability?

Do you also want to verify customers faster, digitalize KYC processes, and enhance your reliability?

Do you also want to verify customers faster, digitalize KYC processes, and enhance your reliability?

Contact us to discover how Bluem can help your organization make KYC more efficient, secure, and user-friendly.

Contact us to discover how Bluem can help your organization make KYC more efficient, secure, and user-friendly.

Contact us to discover how Bluem can help your organization make KYC more efficient, secure, and user-friendly.