Automated Processes

Manages your AML Compliance with automated processes that enable compliance with GDPR 

  • Enable your customers to provide KYC information from a PC or mobile phone
  • Review and customise the AML processes to best suit your exact requirement
  • Deliver all necessary data for a Subject Access Requests on the click of a button
  • Control access to different categories of data through template settings
  • Queue all data types for destruction with template retention periods required in law
  • Have real visibility of your processes from your personalised dash board

Multi Factor Authentication

Multi Factor Authentication is used with all 3rd party access (your customers) to the system and periodically applied to all users to protect your data. 

And first goes further…. users cannot ‘self update’ e-mail or mobile phone details (the factors), all factors must be approved by a system user before they can be used. This provides an enhanced level of security protect your data.  

 

Masking of key documents

Key documents such as passports or driving license, or documents containing Special or criminal data, that need to be retained to demonstrate compliance with AML or Consent obligations can be retained lawfully by masking the document and only allowing necessary details to be legible.

This enables the Controller to retain data in a manned that they can demonstrate compliance and is consistent with GDPR. Unmasked documents may be held under restricted access controls or be deleted

GDPR & Subject rights

Data Subjects own their personal data, and first enables you to deliver on your obligations to Subjects under GDPR in an efficient manner … and in particular;

  • Right of Access – Have access to their personal data, and can only have the data that they are entitled to view.
  • Right of Transfer – Subjects can transfer identity and other personal data with ease to make the update of necessary compliance data easier and faster.
  • Correct and keep data up to date – all fields on the system can be updated with a full audit history of the changes. Subjects can self update ‘proof of identity’, ‘proof of address’ and other data as date timelines expire. All self updates by Subjects will queue for your approval.  

Where a Subject creates an account directly with first, the Subject can manage these actions on a self service basis.

ID Validation Premium

ID validation plus provides validation that other obliged entities have confirmed that the details and image on an identity document are correct. It flags 3rd party inspection of documentation and identifies the number and location of Solicitors or Accountants that have reviewed a document. 

It also delivers validation warnings if any further registered solicitor or accountant denies the validity of the ID document.

Data Security

This is a highly secure environment with

  • Encryption of all data in transit and at rest
  • Data is stored on data centers located in Europe that align with Up-time Institute and Telecommunications Industry Association ANSI/TIA-942-A Tier 3 or Tier 4 standards
  • N+2 redundancy methodology for critical equipment operation
  • Private backbone for secure data movement between data centre regions
  • Multi Factor Authentication for all third party access 

API ready for custom integration

Integration is implemented via a secure RESTful interface allowing enterprise customers to integrate AML Manager into any in-house processes requiring Personal and Organisational due diligence services. 

The data will continue to be stored on our secure data centres and be accessible and managed via the user interface as needed, or the data can be held on-premises if required by the customer.

Simple administration of your system

The system administration panel of your first system enables you to  

  • Manage your subscription, view your invoices account history,and add or remove user subscriptions 
  • Define organisation structures and groups, and control access
  • Monitor system access
  • Implement control settings over the deletion of data
  • Configure system defaults to suit your requirements
  • Customise system content to cater for your specific requirements (Enterprise customers only)