Responsible Digital Ids
Responsible Digital Ids
Gaps in the Current Ecosystem and the Role Financial Service Providers Need to Play in
Developing Responsible Digital Identities… ......................................................................................18
The Cautionary Tale of Pairing Digital Payments with Low Financial Literacy… .........................19
GLOSSARY… ...............................................................................................................................................26
2
List of Figures and Tables
Figure 5: Percentage of Borrowers who Report having Repaid Late or Defaulted on a Digital
Loan ............................................................................................................................................. 21
such as WeChat & AliPay who want their billions of users to use their digital wallets to conduct financial transactions.
...will have to require their users to submit their personal and financial data for KYC - AML complianc
...granting the big techs access to legal identities, for the first time, which they can connect to the us
AliPay
AliPay is now the dominant force in Chinese mobile payments, particularly in the realm of online marketplaces, as the platform on wh
520 million people use AliPay as their payment provider to shop online, to shop in person, to transfer money, and to invest excess fun
Banks
Payment provider
MNO
Online retailer
Consumer tech
Internet Provider
Social Media
The financial services industry has sound policies and regulations in place to conduct proper due
diligence, protect personal information, reduce the risk of misuse of personal information by
criminals, and ultimately ensure financial stability. However, the risk of running afoul of these
regulations, and the will to reduce the risk of exposure to financial crime has also contributed to
the financial industry’s “de-risking” practices, with firms limiting their business in certain
markets and product offerings. These practices can restrict low-income segments of the
population from gaining access to finance. In response, we observe that lower tier requirements
have been created in some places to provide access to basic financial products while creating a
parallel due diligence system for lower income segments. Even though lower tier requirements
could facilitate onboarding, we believe having different standards for different income groups
will de-harmonize financial services frameworks, jeopardize financial crime risk mitigation, and
will not automatically result in broader access to the full suite of financial services and products.
Additionally, relegating these customers to a separate system could inhibit their growth and
integration into the broader economy through mainstream financial services.
In the IIF’s first paper on digital identities, “Embedding Digital Identities in AML
Frameworks,”6 we highlight considerations for international standard setters and local
regulators on how to embed Digital Identity into their Anti-Money Laundering (AML)
frameworks, ensure their widespread practical uptake, strengthen the defense mechanisms
against financial crime, increase the efficiency of the system, and contribute to more inclusive
AML frameworks.
Financial service providers are not the sole source for digital identities, as trusted sources for
each digital identity attribute should be considered the ideal provider, nevertheless, financial
service providers have proven to be trusted data custodians and are capable of securely
managing digital identity data attributes.
In this paper we will investigate the role financial service providers can play, in the broader
digital identity ecosystem, in positively impacting underserved markets and economies, while
growing their business and building on the sound policies and regulations meant to ensure
consumer protection and global financial stability.
6Institute of International Finance, Digital IDs in Financial Services Part 1: Embedding in AML
Frameworks, August 2019,
https://www.iif.com/Portals/0/Files/content/Innovation/08272019_iif_digital_id_part_1.pdf
Digital Identity vs. The Digital Identification Process
Digital Identity is a rapidly developing ecosystem with many different stakeholders involved.
Throughout this paper we will be referencing the term digital identity and the process digital
identification frequently. Digital Identity can best be described as a compilation of
electronically captured and developed attributes and credentials of a uniquely identifiable
persona that can be linked to a physical person. It should be noted that there is an evolving
taxonomy of the term and it is used broadly and interchangeably by different actors in the
ecosystem. In order to be able to achieve inclusiveness, a wide variety of digital identity data
attributes (as opposed to one true source of identity, e.g., government issued document) need to
be considered.
Trusted Digital Identity Issuers: For a government, a non-governmental
organization, or a person to be a reliable source of identification information they must
do the following: 7 1) Support an ongoing relationship (as opposed to providing) a one-
time service 2) Be in a sector which requires strong record-keeping practices and
controls for all stages of a customer’s lifecycle 3) Only provide identification that has an
active and sustained relationship with the person being identified 4) Provide
traceability to demonstrate the identification is in place and can be relied upon 5)
Provide security features.
Digital Identification on the other hand, is the process of verifying claimed attributes and
credentials unambiguously linked to a persona in a domain through a digital channel. For the
electronic Know-Your-Customer (e-KYC) process financial institutions – in addition to
identifying potential customers – must conduct thorough due diligence.
In most jurisdictions, government-issued documents have been used as the primary
identification method for individuals. Due to the integrity of government-issued documents,
financial service providers have traditionally relied upon them to conduct customer due
diligence and fight financial crime. However, with the emergence of technology and an
individual’s digital footprint, the identification process needs to evolve to include multiple
digital identity attributes issued from reliable and trusted entities to match them to a person’s
identity.
As a precursor to our three-part digital identity series the IIF published a document called
“Digital Identity: Key Concepts”8 which clearly distinguishes between Digital Identity and
Digital Identification as two separate yet related concepts. Please refer to that text for a more
detailed description on these key concepts. Additionally, please find a glossary at the end of this
paper with key terms related to digital identities.
7
Di Mira, Digital Identification Methods and Testing for AML Programs, 2019,
https://www.acams.org/white-paper-digital-identification-methods-and-testing-for-aml-programs/
9Institute of International Finance, Digital IDs in Financial Services Part 1: Embedding in AML
Frameworks, August 2019,
https://www.iif.com/Portals/0/Files/content/Innovation/08272019_iif_digital_id_part_1.pdf
standards and recognizing an approved body to handle grievances and address problems that
might arise.
Finally, we also see hybrid or federated models arise in which ownership and responsibility
are shared by multiple private and public entities. The ecosystem usually operates on shared
common standards where the network is publicly endorsed or based on standards issued by the
public sector. Examples include the UK’s GOV.UK. This model requires coordinated decision
making, which introduces complexity that may disincentivize institutions from participating as
ID providers.
One of the most important aspects when designing operational models for digital identities is
creating a set of interoperable ecosystems to facilitate the transaction process for users across
different industries and jurisdictions.
Ecosystem Interoperability: The ability of different functional units—e.g.,
systems, databases, devices, or applications—to communicate, execute programs, or
transfer data in a manner than requires the user to have little or no knowledge of those
functional units will be essential for digital identities to be globally recognized. For
digital identities to be globally recognized and accepted, a universal definition and
agreed upon features need to be in place. Currently the digital identity
ecosystems that are in place are closed looped systems and function within
national boundaries. Creating a cross-border solution will greatly
increase uptake and functionality of digital identities. As emphasized in our
first paper, states should set basic criteria for what defines digital identities. This will
enable the emergence of a global standard for digital identities. States can then build
their own solutions and keep them interoperable in design. Member states would have
the freedom to build and maintain their own digital identity solutions while keeping
the door open for cross-border interoperability.
There are several digital identity ecosystem stakeholders that provide different services to
consumers. As the lines between technology companies and financial service providers get
blurrier, technology companies are entering the space of providing financial services and
financial service providers are undergoing digital transformations to become more like
technology companies.
In the current state of play, technology companies are gathering vast amounts of data that
can help identify digital behavior and create corresponding digital personas. Financial
institutions are conducting customer due diligence and providing financial services and
products while ensuring financial stability and safe financial management practices are being
adhered to; governments/regulators are enforcing the appropriate standards, policies and
regulations to advance digital identity issuance and management in an inclusive manner while
ensuring financial stability is maintained. Later in the paper we will dissect the ecosystem
stakeholders and highlight obvious gaps and opportunities for creating a more interoperable
model that will serve low income segment customers more efficiently.
Responsible Digital Identity and Identification Processes:
Impacts on Financial Inclusion
Gaining access to financial services enables entrepreneurs and small and medium enterprise
(SME) owners to utilize institutions’ valuable consulting services to help invest capital and grow
their businesses. This in turn empowers them to make better business decisions, which results
in business expansion and job creation, and supports economic prosperity. However, for an
individual or business to be recognized in the formal economy and for nations to reap the
benefits, citizens first need to possess some form of identification. As mentioned earlier, around
1.7 billion people are unbanked and 1 billion lack legally recognized identities and
consequently can be denied for crucial economic and national benefits. The gender gap in
identity ownership is also noteworthy with 45% of women (over the age of 15) in low income
countries lacking a legal identity compared to 30% of men.10
Gender Inclusivity: A gender gap in account ownership has been a persistent
challenge for financial inclusion especially in developing economies (there has been a
consistent 9% gender gap since 2011 according to the latest Findex numbers). Digital
identification will enable a more efficient customer due diligence process and overcome
the common account opening barriers that disproportionately affect women and girls
in developing countries. Financial institutions will have the opportunity to partner
with governments to receive and pay government subsidies and cash transfer
programs targeted at women. The increasing use of transactional data on mobile
phones will also help financial service providers target women with products and
services that cater to their lifestyle needs.
Digital identification and identities can have profound impacts on financial inclusion. In this
section we will aim to identify some of the major challenges faced by the unbanked and highlight
which of those can be overcome by implementing responsible digital identity and identification
procedures.
Family member
already has an account
Financial Institutions
too far away
Lack of necessary
documentatiom
Lack of trust
Religious reasons
11
PwC, The Future of Onboarding,
December 2016, https://www.pwc.com/il/he/bankim/assets/pwc-the-future-of-onboarding.pdf
12
Unique Identification Authority of India | Government of India,
About Your Aadhaar - Unique Identification Authority of India: Government of India, uidai.gov.in/my-
aadhaar/about-your-aadhaar.html, Viewed 19 Sep. 2019.
13
Kaka et al., Digital India: Technology to Transform a Connected Nation, McKinsey & Company, Mar.
2019, www.mckinsey.com/business-functions/digital-mckinsey/our-insights/digital-india-technology-to-
transform-a-connected-nation
identity. This enables financial institutions to drive digital
inclusiveness by removing location barriers to conducting
business constraints to establishing mutual trust and
enticated through biometric verification and a pin code only known to the user. South Africans can apply for their smart ID cards at local b
removes the need for physical identity documentation.14
ard with a chip that carries embedded files and can function as definitive proof of ID in an electronic environment. The ID card provides di
Active Usage: Opening a bank account is insufficient
for financial inclusion. Practitioners need to ensure
that underserved segments remain actively engaged.
Using digital identities, financial institutions can use
the real time digital attributes of individuals to analyze
and predict customer behavior and create tailored
digital financial savings and credit products that serve
clients lifecycle needs.
Another reason the unbanked are denied access to credit
is due to their lack of financial history data. Low income
segments usually have no formal proof of income and are
considered “thin file customers” with no credit history
and alternatively no credit score which making them high
risk customers for financial service providers. This is
where digital identities can play an important role in
providing alternative data sources. Digital identities are a
set of digital credentials and attributes that uniquely
identify a person and their behavioral patterns. The
attributes can include alternative data sets to create
virtual/digital personas of potential bankable customers
based on their digital behavior. For example, through
taking digital bill payment-or MNO call data records and
analyzing the potential customer’s payment transaction
history, financial service providers can create alternative
data scores based on the customer’s digital footprint.
Digital tax, subsidy and e-commerce activity are all
examples of alternative digital data sets that can be used
to profile historically unbanked consumers. We
emphasize the use of alternative data in detail in IIF’s
“Accelerating Financial Inclusion with New Data”17
report and will further be highlighting the business
opportunity of digital identities in our third and final
report.
14 Busisiwe, Mbuyisa- Muhammed,Omarjee and Stanton, Naidoo from Standard Bank. (2019, June).
Phone interview with Amin,Khairy.
15 Gemalto, South African ID Card : Identity and Citizenship, 6 Mar. 2019,
https://www.gemalto.com/govt/customer-cases/south-africa.
16 E-Estonia, We Have Built a Digital Society and so Can You, e-estonia.com
17 Center for Financial Inclusion & Institute of International Finance, Accelerating Financial Inclusion
Tax collection (R) Access to financial services (E,R,S &P) e-kyc (E,C &S)
18McKinsey & Company, Digital Identification: A Key to Inclusive Growth, April 2019,
www.mckinsey.com/business-functions/digital-mckinsey/our-insights/digital-identification-a-key-to-
inclusive-growth
Governments tend to gain from broader tax collection, more efficient subsidy/social program
payouts, digitized G2P & G2B payments, and enabling women to be more engaged in the
economy by decreasing the gender gap. After India implemented Aadhaar, for example, the
leakage of funds for pension payments dropped by 47% when the payments were made through
biometric smartcards rather than being handed out in cash.19 However, benefits for consumers
would only be reaped if data is managed and utilized responsibly.
Financial institutions have an important role to play in ensuring that vulnerable consumers are
not being taken advantage of and that practices ensuring consumer protection and financial
wellbeing are enforced appropriately.
To be able to fully leverage the capabilities of digital identities financial service providers will
need to gain access to and analyze alternative data sets such as MNO call data records, global
positioning data, digital payment data (bill, subsidy, and tax payments records, for example),
social media data, and digital health data among others. This will be crucial data when creating
alternative credit scores based on the digital data footprint for low-income population segments,
known for being “thin file customers” with limited financial transaction histories. Technology
companies currently possess this data on large scale consumer segments and are equipped with
experienced human capital (data scientists) leveraging an agile technology infrastructure.
Regulators on the other hand are struggling to come up with standard policy and regulation
frameworks that would protect consumers in this new ecosystem of easy finance through digital
identities.
20
GSMA, The Mobile Economy 2019, 2019 https://www.gsmaintelligence.com/research/?
file=b9A6E6202EE1D5f787cfebb95d3639c5&download 21 GSMA, The Mobile Economy 2015, 2015
https://www.gsma.com/mobileeconomy/archive/GSMA_ME_2015.pdf
22
GSMA, The Mobile Economy 2019, 2019, https://www.gsmaintelligence.com/research/?
file=b9A6E6202EE1D5f787cfebb95d3639c5&download 23 GSMA, The Mobile Economy 2015, 2015,
https://www.gsma.com/mobileeconomy/archive/GSMA_ME_2015.pdf
24 Lusardi, et al., Millennial Mobile Payment Users, Global Financial Literacy Excellence Center (GFLEC),
gflec.org/initiatives/millennial-mobile-payment-users/
China’s Credit Boom
Even though China’s financial inclusion numbers have significantly improved in recent years,
easy access to credit through technology platforms such as Alipay and TenCent has raised
several concerns over indebtedness, especially amongst younger generations, which can have
negative effects on the health of the economy. According to a recent Bloomberg article, credit
secured through technology has skyrocketed in China with unsecured consumer loans growing
on average 20% annually since 2008.
9t
0
2007 2019
‘China Household Short -term Consumption Loans (in Yuan),’ sourced from Luo, Han & Hu, China’s Generation Z Is
Hooked on Credit, Bloomberg, July 2019.
The credit which has ranged from 500-50,000 yuan (eq. USD 70-7,000) is being used to buy
basic everyday staples such as clothes, food, and travel and is approved virtually on the spot
through mobile applications even for consumers with no previous credit history. This leads to a
boom in debt-fueled consumption that can negatively impact future spending and consumer
purchasing power since future disposable income will be used to repay outstanding debt.
Consumer finance through the internet in China is expected to double by 2021 to reach 19
trillion yuan (USD 2.7 trillion) up from 7.8 trillion yuan (USD1.1 trillion) last year.25
25Luo, Han & Hu, China’s Generation Z Is Hooked on Credit, Bloomberg, 31 July 2019,
www.bloomberg.com/news/articlES/2019-07-31/china-s-generation-z-is-hooked-on-credit
The Sub-Saharan Digital Credit Revolution
Sub-Saharan Africa is arguably the first region to have introduced digital credit on a mass scale
with initiatives such as M-Pesa which has brought mobile money to millions of borrowers since
2012 in countries such as Kenya and Tanzania. Automated credit decisions resulting in instant
loans coupled with remote disbursement and repayment make mobile money an efficient and
convenient ecosystem for many low-income borrowers.
In a working paper titled “A Digital Credit Revolution,” CGAP (Consultative Group to Assist the
Poor), a global partnership of more than 30 leading development organizations that works to
advance the lives of poor people through financial inclusion, highlights the dangers of the sub-
Saharan digital credit surge fueled by mobile money in the region. Fifty-six percent of borrowers
in Tanzania and 47% in Kenya have repaid a digital loan late; 31% in Tanzania and 12%in Kenya
report having defaulted.
40%
Tanzania, 31%
30%
20%
Kenya, 12%
10%
0%
Repaid a loan late Defaulted on a loan
Source: National phone survey of N=3,150 in Kenya, of whom 1,037 have used digital credit and national phone survey of N=4,574 in Ta
of whom, 1,132 have used digital credit. Both surveys were conducted June--August 2017 and were weighted to be representative of
phone owenrs.
The paper goes on to explain that late repayments can have significant consequences for
borrowers, such as having their accounts frozen or getting charged a second origination fee on
rolled over loans. The unpaid loans get reported to the Credit Risk Bureau resulting in a
negative credit score for borrowers and making it harder for low-income segments to re-borrow
once they have been deemed too risky. In order to be able to repay the loan, research
respondents in Kenya and Tanzania have cited actions such as reducing food purchases,
borrowing additional money to repay the loan, and even skipping school and medical
treatments in some instances.26
26 Kaffenberger, Michelle, and Edoardo Totolo., A Digital Credit Revolution: Insights from Borrowers in
21
Kenya and Tanzania, Working Paper, CGAP, 2018, Washington, D.C.
21
Libra’s Electronic Wallet and Unintended Consequences
Now imagine a technology company with a scale such as Facebook’s platform (including
Facebook, WhatsApp, and Instagram) entering the digital finance arena. Facebook has
promised to find remittance solutions for the unbanked population by granting access to the
Calibra wallet through WhatsApp to a customer base of over 2.4 billion monthly active users
across its three platforms. Libra/Calibra promises to attract unbanked customers who need to
transfer or receive remittances and are usually considered to be financially illiterate.
27Source: Bruegel based on S&P Global FinLit Survey and Global Findex dataset (World Bank).
Notes:” Increasing need for banking services” is measured as the difference between the % of people
sending/receiving remittances in the previous year and the % of people that have a bank account
22
The above data was published by Brugel, a European think tank, and derived from the S&P
Global FinLit Survey and Global Findex dataset. It conveys that countries that most need
access to banking services are also those that are the least financially literate.28 For now,
remittances are the only product that Calibra is promising to offer, however if other financial
products are to be offered, using alternative data to create digital identities and behavioral
patterns on a platform with such scale, potential systemic financial stability risks are
bound to arise.
Low income segments who have low financial literacy will be particularly vulnerable to financial
distress. Financial service providers that are regulated, experienced in risk management, and
that can ensure both consumer wellbeing and financial stability will be essential to creating a
sustainable digital financing solution based on an individual’s digital footprint/identity.
Financial service providers are risk managers at heart. Regulatory supervision incentivizes them
to keep non-performing loans to a minimum and ensure that consumers do not exceed allocated
debt burden ratios set in place by regulators. Financial service practitioners are also the best
versed to advise on financial management best practices and ensure that consumers with low
financial literacy are well positioned to overcome arising liquidity issues and thus are best
positioned to act as crucial focal points in this new emerging ecosystem of digital finance based
on digital identities.
28Demertzis, Maria, and Jan Mazza, Libra: Possible Risks in Facebook's Pursuit of a 'Stablecoin’,
Bruegel, 17 July 2019, bruegel.orG/2019/07/libra-possible-risks-in-facebooks-pursuit-of-a-stablecoin
The Outlook: Responsible Digital Identity Ecosystems
As it stands, the digital identity ecosystem players are operating in silos with financially
excluded low-income population segments being affected the most. However, some progressive
financial institutions are trying to make the current ecosystem work more efficiently by
promoting interoperability between all stakeholders in order to reach common standards among
all players. This ecosystem is one in which trusted financial service providers leverage their
experience with risk management, gained through decades of abiding by banking regulation,
while utilizing the alternative data amassed by technology companies and third-party vendors.
In this ecosystem identities can be verified by multiple digital identity attributes (bill and tax
payment records, financial statements, call data records, etc.) that are issued by trusted entities
who have an established relationship with consumers. In this ecosystem financial service
providers would act as financial advisors, while utilizing technology platforms’ large consumer
bases to best help protect low-income populations with low levels or financial literacy.
Open APIs
APIs
We have observed a trend wherein open banking platforms and APIs create the interoperability
and data sharing frameworks required between the ecosystem players, helping financial service
providers harness the vast amounts of data collected through customer touchpoints. However,
to fully leverage the power of data, two key aspects need to be in place: (i) a truly open data
ecosystem beyond financial services where customers can benefit from their data regardless of
who holds it (financial institutions, retail companies, technology platforms, mobile network
operators etc.) and (ii) international harmonization in terms of common standards to at least
ensure a level of interoperability instead of multiple fragmented standards. To fully engage
customers, companies should reap the power of data and be able to use all the available
customer data (based on previous customer consent) regardless of where it resides.
Consequently, this will improve the customer experience and provide safer and more tailored
digital products and service offerings.
Financial service providers looking to compete in the new ecosystem and serve a larger customer
base are transitioning from the brick and mortar banking approach traditionally aimed at high
net worth individuals (known for having a high Average Return Per Customer [ARPU]- low
frequency and high value transactions), to contextual banking aimed at mass market segments
(known for having a low ARPU - high frequency and low value transactions). To make this
transition sustainable and economically more viable financial institutions are harnessing
emerging A, B, C, D (Artificial Intelligence, Blockchain, Cloud Computing, and Data Analytics)
technologies to increase efficiencies and drive down operational and transactional costs. A trend
has appeared in which financial service providers are becoming more like open platforms
embracing innovation and collaboration in order to make banking more affordable, accessible,
tailored, and sustainable. We will be discussing this phenomenon in greater detail in our
upcoming third paper which explores the potential business opportunities that can be harnessed
from digital identities.
Glossary
Digital Identity is a rapidly developing area, with some actors outside the traditional financial
service industry, and terminology is still emerging and evolving. As a result, we thought it would
be useful to share a sizable glossary of terms and common definitions as a convenient reference
for the reader.
5G
5G is the 5th generation of cellular network technology with key features including one
millisecond latency and up to 10Gbps download speed. Additionally, the 5G network is ready to
allow 1 million devices to connect per square km which is key to connecting the devices required
for Internet of Things. Finally, 5G will provide a connection to the internet for devices travelling
up to 500km/h.
Automated Fingerprints Identification System (AFIS)
A system which automatically compares an unknown fingerprint or set of fingerprints against a
database of stored fingerprints in order to find a potential match. Although this system is
primarily used by law enforcement agencies to verify identities there is additional application in
civil or government agencies.
Alternative Data Sources
Data sources such as mobile phone billing, utility billing, e-commerce billing, social media,
geographic and others that have not traditionally been used in financial services.
Application Program Interface (API)
A set of protocols and definitions that are used to standardize and automate communication
between computer programs allowing them to access the features or data of an operating
system, application or other service. 29
Artificial Intelligence/Machine Learning
Artificial intelligence enables software to exhibit human-like intelligence, including learning,
planning, reasoning, problem-solving, and decision-making. Artificial intelligence is a broad
field with many sub-fields and related fields, including "machine learning," "deep learning," and
"cognitive computing." 30
Machine Learning is an increasingly important area of cognitive computing which has built
upon many of the tools of statistics and econometric modeling. Four key attributes that most
ML approaches conform to are: 1. A primary goal of optimizing out-of-sample predictive
performance facilitated by welltuned regularization. 2. A significant degree of automation in the
model development process. 3. The use of cross-validation to model relationships in the data,
i.e., divide data into random separate sets for the purpose(s) of training, testing, and validation.
31 Institute of International Finance, Machine Learning in Credit Risk 2nd Edition Summary Report,
August 2019, https://www.iif.com/Publications/ID/3519/Machine-Learning-in-Credit-Risk-2nd-
Edition-Summary-Report
32 Biometric Update, Glossary of ID4D terms, April 2019,
https://www.biometricupdate.coM/201904/glossary-of-id4d-terms
33 International Telecommunication Union, Baseline identity management terms and definitions, April
2010, https://www.itu.int/rec/T-REC-X.1252-201004-I
34 National Institute of Standards and Technology, Digital Identity Guidelines, June 2017,
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800 -63-3.pdf
35 Financial Action Task Force, DIGITAL IDENTITY – HIGH - LEVEL ISSUES FOR GUIDANCE,
September 2018.
Authorization
Permission granted to perform a given action based on successful authentication and
permissions with corresponding levels of assurance.
Biometrics
A biological (fingerprint, face, iris) or behavioral (gait, handwriting, signature, keystrokes)
attribute of an individual36 that can be used for automated recognition.37
Blockchain
A blockchain is a distributed structure to record data in blocks and then chain them to the next
block using a verification method such as a cryptographic signature. These blocks form a
common distributed ledger which can be viewed and validated by any node on the network and
has attributes similar to a database.
Claimant
A digital persona asserting ownership of certain identity attributes
Cloud Computing
Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to
a shared pool of configurable computing resources (e.g. networks, servers, storage, applications,
and services) that can be rapidly provisioned and released with minimal management effort or
service provider interaction. With cloud customers share the same physical resources, securely
separated at the logical level, supporting heterogeneous client platforms such as mobile devices
and workstations.
Concentration Risk
A market in which few players concentrate most of the market share for the provision of a good
or service. Such a market condition can pose a substantial threat in the case of operational
failure by a provider; introducing portability standards and encouraging multiple vendors is a
strategy to mitigate this risk.
Credential
A credential is an object or data structure that signals ownership over an identity as validated by
the entity that issues it. Passports, ID cards, passwords are credentials; in the digital identity
space credentials can include digital tokens or registered biometrics.
Customer Due Diligence (CDD)
The objective of CDD is to enable the bank to understand the nature and purpose of customer
relationships, which may include understanding the types of transactions in which a customer is
likely to engage. These processes assist the bank in determining when transactions are
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800 -63-3.pdf
potentially suspicious.38 FATF’s Recommendation 10 on CDD is based on four pillars, requiring:
1) identification and verification of customers, 2) identification and verification of beneficial
owners, 3) understanding the nature and purpose of transactions, 4) monitoring the clients and
their transactions on an ongoing basis.39
Cybersecurity
Technologies, processes and measures that are designed to protect systems, networks, and data
from cyber-attacks and other incidents.40
Cyber-resilience
Maintaining the entity´s overall ability to deliver the intended outcome continuously at
all times, even when regular delivery mechanisms have failed, such as during a crisis or
when a security breach occurs. Being cyber resilient includes the ability to prepare for
and adapt to changing conditions and withstand and recover rapidly from disruptions.41
Data Analytics
Data analytics refers to an analysis process that encompasses the sorting and cleansing raw
datasets, the subsequent modelling and analysis of sorted data and the conclusions drawn from
the analysis. Through using algorithms and applied computational power data analysis allows
for the observation of trends that are typically unobservable to humans given the magnitude of
the dataset.
Data Proportionality
When assessing the processing of personal data, proportionality requires that only that personal
data which is adequate and relevant for the purposes of the processing is collected and
processed.42
Data Portability
Part of open banking and new data frameworks; data portability allows users to take their
banking history and/or identity attributes to additional financial service providers than those
that they have existing relationships with.
Note: Data portability is linked to the concept of self-sovereign ID.
Device ID/Device Fingerprinting
Device fingerprinting is a device identification technique for identifying a computing device
based on its unique configurations. While many people might own the same device model
factors such as location, time zone settings, operating system, apps and plugins installed,
38 Federal Financial Institutions Examination Council, Customer Due Diligence — Overview, May 2018,
https://www.ffiec.gov/press/pdf/CustomER%20Due%20Diligence%20 -
%20Overview%20and%20Exam%20Procedures-FINAL.pdf
39 Financial Action Task Force, The FATF Recommendations, June 2019, https://www.fatf-
gafi.org/media/fatf/documents/recommendations/pdfs/FATF%20Recommendations%202012.pdf
40 Institute of International Finance, IIF Staff Paper on Addressing Cybersecurity Regulatory
https://www.mckinsey.com/~/media/McKinsey/Business%20Functions/McKinsey%20Digital/OuR%20I
nsights/Digital%20identificatioN%20A%20key%20to%20Inclusive%20growth/MGI-Digital-
identification-Report.ashx
45 ID4D, Practitioner’s Guide, June 2019,
http://documents.worldbank.org/curated/en/248371559325561562/pdf/ID4D-Practitioner-Guide-Draft-
for-Consultation.pdf
have or something you are.46 Examples of factors include passwords, fingerprints, iris scans and
keycards.
Financial Inclusion
Providing access to an adequate range of safe, convenient and affordable financial services to
disadvantaged and other vulnerable groups, including low income, rural and undocumented
persons, who have been underserved or excluded from the formal financial sector.47
Unbanked
The unbanked refers to those without a checking or savings account.
Underserved/Underbanked
The underbanked may have a checking or savings account but regularly rely on
alternative financial service providers due to barriers in use such as access, financial
literacy, thin credit history and costs.
Fraud Prevention
The prevention of the use of false or misrepresented information by entities to gain illicit access
to services.48 A primary focus of fraud prevention solutions is addressing weaknesses in current
manual processes where false information or manufactured identities are used. Strong digital
identity frameworks with widespread implementation will strengthen the connection between
physical persons and information on record, lessen the spread of fake identities and allow for
greater traceability and verification of transactions, thereby consolidating efforts to prevent
fraud.
Foundational Identification System
An identification system primarily created to be used for all legal identity purposes. Examples of
this include national IDs, civil registries and passport numbers.
Functional Identification System
An identification system created for a particular service such as voting, tax
administration and social programs. Examples of this include tax ID numbers, ration
cards or voter IDs.
Transactional Identification System
A transactional digital identity is intended to ease the conduct of transactions 49;
typically, a transaction identity comprises biographical data. The specific set of
biographic data required depends on the requirements of the transaction.
General Data Protection Regulation
46 National Institute of Standards and Technology, Digital Identity Guidelines, June 2017,
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800 -63-3.pdf
47 Financial Action Task Force, FATF Guidance on AML/CFT measures and financial inclusion, with a
http://www3.weforum.org/docs/WEF_A_Blueprint_for_Digital_Identity.pdf
49 International Telecommunication Union, Digital Identity Roadmap Guide, November 2018,
https://www.itu.int/dms_pub/itu-d/opb/str/D-STR-DIGITAL.01-2018-PDF-E.pdf
A European Union directive that establishes binding parameters for the collection and use of
data that can be used to identify residents of the European Union. The GDPR is designed to
protect data across all sectors harmonize data privacy laws across Europe, Protect and empower
all EU citizens data privacy and Reshape the way organizations across the region approach data
privacy.50
Identity Provider
A trusted entity—e.g., a government agency or private firm—that issues and/or authenticates
credentials.51
Internet of Things
The Internet of Things refers to the state in which most devices are connected to the online
network and are therefore in a perpetual state of sending and receiving data. This allows for
person to person, person to machine and machine to machine communication to occur and
consequent opportunities for both significant efficiency gains and significant security concerns
over data breaches.
Interoperability
The ability of different systems, databases, devices, or applications to communicate, execute
programs, or transfer data in a manner than requires the user to have little or no knowledge of
those functional units.52
Know Your Customer (KYC)
Refers to the collecting, generating and processing of customer and applicant data as a means of
preventing financial crime. Know-Your-Customer processes include sanctions and politically
exposed person-checks, transaction and behavior monitoring and risk assessments.
Note: See Customer Due Diligence for further information
Electronic-Know Your Customer (E-KYC)
E-KYC is a process in which approved entities either query a digital (and usually
national) ID system to authenticate or verify their customers’ identities and, in some
cases, retrieve basic information about them, or, allow customers to onboard remotely
using biometric technology such as facial recognition software and fingerprint or iris
scanning. E-KYC systems can improve the onboarding process by reducing or
eliminating paper-based procedures and record-keeping, which reduces cost and time
spent on verification, making it more profitable to provide services to low-income
customers.53
50 European Union, REGULATION (EU) 2016/679 OF THE EUROPEAN PARLIAMENT AND OF THE
COUNCIL of 27 April 2016, April 2016, https://eur-lex.europa.eu/legal- content/EN/TXT/PDF/?
uri=CELEX:32016R0679&from=EN
51 ID4D, Practitioner’s Guide, June 2019,
http://documents.worldbank.org/curated/en/248371559325561562/pdf/ID4D-Practitioner-Guide-Draft-
for-Consultation.pdf
52 International Organization for Standardization & International Electrotechnical Commission, ISO/IEC
55 Institute of International Finance, Digital Identities in Financial Services Part 1: Embedding in AML
Frameworks, August 2019, https://www.iif.com/Publications/ID/3534/Digital -IDs-in-Financial-
Services-Part-1-Embedding-in-AML-Frameworks
56 Ibid.
57 Ibid.
58 European Commission, DIRECTIVE (EU) 2015/2366 OF THE EUROPEAN PARLIAMENT AND OF
http://www3.weforum.org/docs/WEF_INSIGHT_REPORT_Digital%20Ide ntity.pdf
63 Financial Action Task Force, The FATF Recommendations, June 2019, https://www.fatf-
gafi.org/media/fatf/documents/recommendations/pdfs/FATF%20Recommendations%202012.pdf
64 Tokenex, Tokenization vs Encryption: Which One is Best for Your Business?, July 2013,
https://www.tokenex.com/blog/tokenization-vs-encryption-which-one-is-best-for-your-business 65
Visa, All you need to know about Tokenization,
https://usa.visa.com/dam/VCOM/download/security/documents/visa -security-tokenization-
infographic.pdf, viewed 23rd August 2019.
personal information did not form part of the payment message between the parties involved
and therefore the sensitive information could be better protected in a secure environment.
Transaction Monitoring
Transaction monitoring is an Anti-Money Laundering compliance obligation referring to a
financial institution’s ongoing surveillance of their customer transactions to ensure they are not
participating in financial crimes. It is predicted that digital identities will simplify the
compilation of data at onboarding and beyond to better understand customers and therefore
better classify their transactions as fitting their behavior profile or presenting a risk.
Trust Score
A trust score is an assessment of the probability of a correct match in the authentication of a
user.66 Typically, a trust score is assessed by a third party authentication service provider who
will aggregate factors such as the registered email address and whether it contains an
alphanumeric string, the time of transaction, the IP address, typical user behavior and even the
cadence of the password entry.
Unique Identifier
An alphanumeric string frequently used in payment services that is assigned and issued to a
specific individual, entity or transaction for the purpose of unambiguous identification within
interoperable ecosystems. 67
Verification
See Authentication
Other Contributors
Brad Carr
Senior Director, Digital Finance
[email protected]
Conan French
Senior Advisor, Digital Finance
[email protected]
Marcus Wimalajeewa
Intern, Digital Finance
[email protected]