{"id":16969,"date":"2024-06-25T09:00:00","date_gmt":"2024-06-25T08:00:00","guid":{"rendered":"https:\/\/www.sage.com\/en-gb\/blog\/?p=16969"},"modified":"2025-05-07T14:54:10","modified_gmt":"2025-05-07T13:54:10","slug":"identity-fraud-combat-framework","status":"publish","type":"post","link":"https:\/\/www.sage.com\/en-gb\/blog\/identity-fraud-combat-framework\/","title":{"rendered":"How the Core Identity Framework can help to combat identity fraud"},"content":{"rendered":"<header class=\"entry-header has-dark-background-color entry-header--has-illustration entry-header--has-illustration--generic\">\n\t<div class=\"container\">\n\t\t<div class=\"entry-header__row row align-center\">\n\t\t\t<div class=\"col col-lg-7 col-xlg-6 entry-header__content\">\n\t\t\t\t\t\t\t<div class=\"component component-single-header\">\n\t\t\t\t\t\t\t\t\t\t<div class=\"entry-header__misc text--subtitle text--uppercase text--small\">\n\t\t\t\t\t\t\t<a href=\"https:\/\/www.sage.com\/en-gb\/blog\/category\/strategy-legal-operations\/\" class=\"entry-header__link\">Strategy, Legal &amp; Operations<\/a>\t\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"entry-title-wrapper\">\n\t\t\t\t\t<h1 class=\"entry-title\">\n\t\t\t\t\t\tHow the Core Identity Framework can help to combat identity fraud\t\t\t\t\t<\/h1>\n\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t<p class=\"entry-header__description\">\n\t\t\t\t\t\t\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t<\/div>\n\t<div class=\"single-post-details container\">\n\t\t<div class=\"col\">\n\t\t\t<span class=\"posted-on \"><time class=\"entry-date published\" datetime=\"2024-06-25T09:00:00+01:00\">25 June, 2024<\/time><\/span><span class=\"reading-time\"> min read<\/span>\n\t\t<button\n\t\t\ttype=\"button\"\n\t\t\tclass=\"social-share-button button button--icon button--secondary js-social-share-button\"\n\t\t\tdata-share-title=\"How the Core Identity Framework can help to combat identity fraud\"\n\t\t\tdata-share-url=\"https:\/\/www.sage.com\/en-gb\/blog\/identity-fraud-combat-framework\/\"\n\t\t\tdata-share-text=\"Please read this interesting article\"\n\t\t>\n\t\t\t<span class=\"social-share-button__share-label\">Share<\/span>\n\t\t\t<span class=\"social-share-button__copy-label\" hidden>Copy Link<\/span>\n\t\t\t<span class=\"social-share-button__copy-tooltip\" aria-hidden=\"true\" hidden>Copied<\/span>\n\t\t<\/button>\n\n\t\t\t\t<\/div>\n\t<\/div>\n<\/header>\n\n\n<div class=\"wp-block-post-author has-dark-background-color alignfull\">\n\t<div class=\"container\">\n\t\t<div class=\"col\">\n\t\t\t\t\t\t\t<div class=\"co-authors\">\n\t\t\t\t\t\n\t\t<div class=\"entry-author-wrapper\">\n\t\t\t<a class=\"entry-author\" href=\"https:\/\/www.sage.com\/en-gb\/blog\/author\/daniellefisher\/\">\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"40\" height=\"40\" src=\"https:\/\/www.sage.com\/en-gb\/blog\/wp-content\/uploads\/sites\/10\/2023\/11\/Danielle-Fisher-350x350.jpg\" class=\"entry-author__image\" alt=\"danielle-fisher\" srcset=\"https:\/\/www.sage.com\/en-gb\/blog\/wp-content\/uploads\/sites\/10\/2023\/11\/Danielle-Fisher-350x350.jpg 350w, https:\/\/www.sage.com\/en-gb\/blog\/wp-content\/uploads\/sites\/10\/2023\/11\/Danielle-Fisher.jpg 600w\" sizes=\"auto, (max-width: 40px) 100vw, 40px\" \/>\t\t\t\t<span class=\"entry-author__name\">Danielle Fisher<\/span>\n\t\t\t<\/a>\n\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t<\/div>\n<\/div>\n\n\n\n<p>In an era propelled by rapid digitalisation, the traditional approaches of in-person meetings and physical document validation are progressively less popular among businesses to verify a client&#8217;s identity.<\/p>\n\n\n\n<p>Nowadays, electronic ID checks tend to be the method of choice.<\/p>\n\n\n\n<p>However, this has introduced heightened vulnerabilities to identity fraud, via the abundance of information available on social media and data aggregation platforms, and the growing frequency of cyber-attacks targeting unsecured systems.<\/p>\n\n\n\n<p>In this article, we look at how you can strengthen your anti-money laundering (AML) processes at your practice with the help of a special framework, so you can stay resilient against identity threats.<\/p>\n\n\n\n<p>Here&#8217;s what we cover:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"#identity\">Identity fraud in the digital age<\/a><\/li>\n\n\n\n<li><a href=\"#anti\">Anti-money laundering checks to carry out<\/a><\/li>\n\n\n\n<li><a href=\"#what\">What is the Core Identity Framework?<\/a><\/li>\n\n\n\n<li><a href=\"#to\">What to look for in an identity verification vendor<\/a><\/li>\n\n\n\n<li><a href=\"#using\">Using the Core Identity Framework in your verification process<\/a><\/li>\n\n\n\n<li><a href=\"#final\">Final thoughts<\/a><\/li>\n<\/ul>\n\n\n\n<div class=\"single-cta\">\n\t<a\n\t\tclass=\"button button--primary gate-73a4cac4-f770-4131-94be-68bb435b7fab\"\n\t\trole=\"button\"\n\t\tdata-button-location=\"content_area\"\n\t\thref=\"#gate-73a4cac4-f770-4131-94be-68bb435b7fab\"\n\t>Download your free e-book, Everything you need to know about anti-money laundering<\/a>\n<\/div>\n\n\n\n\n<h2 class=\"wp-block-heading\" id=\"identity\">Identity fraud in the digital age<\/h2>\n\n\n\n<p>The <a href=\"https:\/\/www.sage.com\/en-gb\/blog\/how-to-complete-your-digital-accountancy-practice-journey\/\">digitalisation<\/a> of processes has undeniably accelerated the efficiency of AML processes across accountancy practices.<\/p>\n\n\n\n<p>However it\u2019s crucial for you, as an <a href=\"https:\/\/www.sage.com\/en-gb\/accountants\/\">accountant or bookkeeper<\/a>, to recognise that along with these advantages come new risks and vulnerabilities. <\/p>\n\n\n\n<p>Specifically, identity fraud has become more pronounced in the digital era.<\/p>\n\n\n\n<p>A notable example is the use of artificial intelligence (AI) paving the way for deepfakes\u2014sophisticated synthetic media that digitally alters appearances to convincingly replace one person&#8217;s likeness with another.<\/p>\n\n\n\n<p>While electronic methods are useful for verifying a client\u2019s identity, you should take care and consider whether the processes you have in place are robust enough to truly authenticate identity.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"anti\">Anti-money laundering checks to carry out<\/h2>\n\n\n\n<p>When it comes to taking on a new client at your practice, money laundering regulators and professional bodies expect you to be certain that you\u2019re dealing with somebody genuine and they are who they say they are.<\/p>\n\n\n\n<p>A failure to do this properly means you could face fine, reputational damage and even end up being taken to court.<s><\/s><\/p>\n\n\n\n<p>The strategies you employ to authenticate clients may vary based on the nature of your interaction\u2014whether it&#8217;s in person or virtual\u2014and the duration of your client relationship.<\/p>\n\n\n\n<p>Each client brings a unique context to the table. And while it&#8217;s tempting to stick to a routine, it&#8217;s essential to recognise that one size doesn&#8217;t fit all.<\/p>\n\n\n\n<p>Need help to ensure you\u2019ve covered all bases when it comes to dealing with client verification at your practice?<\/p>\n\n\n\n<p>A framework we\u2019ve created at Sage will support you to do just that.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"what\">What is the Core Identity Framework?<\/h2>\n\n\n\n<p>The Core Identity Framework is a method we devised that you use to assure yourself that you\u2019ve truly verified the identity of your clients.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/www.sage.com\/en-gb\/blog\/wp-content\/uploads\/sites\/10\/2024\/01\/Core-Identity-Framework-1024x572.jpg\" alt=\"Core Identity Framework\" class=\"wp-image-17539\"\/><figcaption class=\"wp-element-caption\">The Core Identity Framework: A method for ensuring effective client verification<\/figcaption><\/figure>\n\n\n\n<p>It covers the following:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Verifying residence:<\/strong> Can I prove they live where they say they live? This is to confirm the accuracy of their provided address.<\/li>\n\n\n\n<li><strong>Authenticating documents:<\/strong> Have I seen a valid and original (authentic) copy of the identity document? Assuring the authenticity and validity of the provided identification.<\/li>\n\n\n\n<li><strong>Validating identity:<\/strong> Is the person I\u2019m dealing with the person on that identity document? This is to establish a seamless match between the individual and the details stated on the identification document presented.<\/li>\n\n\n\n<li><strong>Documenting evidence:<\/strong> Have I documented all of this as evidence? Documenting all the evidence you have so you can provide it on request at a practice assurance visit.<\/li>\n<\/ul>\n\n\n\n<p>Our exploration of how AML is managed in practice at <a href=\"https:\/\/www.linkedin.com\/post\/edit\/7066424157667753986\/\">GoProposal<\/a> has unveiled a trend whereby many of our accountants and bookkeepers currently address just two or three of these four pillars.<\/p>\n\n\n\n<p>By consistently adhering to the Core Identity Framework, you can establish confidence in your client verification processes.<\/p>\n\n\n\n<div class=\"single-cta\">\n\t<a\n\t\tclass=\"button button--primary gate-73a4cac4-f770-4131-94be-68bb435b7fab\"\n\t\trole=\"button\"\n\t\tdata-button-location=\"content_area\"\n\t\thref=\"#gate-73a4cac4-f770-4131-94be-68bb435b7fab\"\n\t>Download your free e-book, Everything you need to know about anti-money laundering<\/a>\n<\/div>\n\n\n\n\n<h2 class=\"wp-block-heading\" id=\"to\">What to look for in an identity verification vendor<\/h2>\n\n\n\n<p>When it comes to verifying clients, the landscape of identity verification solutions offers a range of options, each catering to distinct verification levels.<\/p>\n\n\n\n<p>The choice that best aligns with your needs hinges upon a close examination of your existing processes.<\/p>\n\n\n\n<p>Here&#8217;s how to navigate these alternatives based on your circumstances:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Face-to-face interactions:<\/strong> If you engage in in-person meetings for identity verification, a more basic electronic check might suffice. But ensuring documentation and secure storage of identity evidence is still a must.<br><\/li>\n\n\n\n<li><strong>Virtual work settings:<\/strong> Moving to a virtual work environment brings a shift towards more comprehensive electronic verification strategies. The absence of physical interactions underscores the importance of ensuring any checks you\u2019re doing electronically are robust.<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"using\">Using the Core Identity Framework in your verification process<\/h2>\n\n\n\n<p>Identity verification vendors offer a range of different types of checks, so anchoring your decisions with the Core Identity Framework when deciding what\u2019s going to work best with your processes is important.<\/p>\n\n\n\n<p>Should your chosen vendor address only two or three core elements, it\u2019s imperative to independently address the remaining component in your AML processes.<\/p>\n\n\n\n<p>For example, many businesses choose to implement document verifications that encompass collection, storage, and validation of clients\u2019 identity documents and addresses.<\/p>\n\n\n\n<p>This would achieve three out of four on the Core Identity Framework.<\/p>\n\n\n\n<p>Even after completing this check, businesses still need to confirm a face match with the presented document, either through an in-person meeting or an online verification method.<\/p>\n\n\n\n<p>You should always refer to your practice assurance body for advice on whether online meetings are deemed to be acceptable.<\/p>\n\n\n\n<p>Another common industry practice involves conducting a basic check and background scan using a client\u2019s name, address and document number.<\/p>\n\n\n\n<p>While this validates the authenticity of the document and the legitimacy of the clients address, it falls short.<\/p>\n\n\n\n<p>In this scenario, neither a valid copy of the documentation has been retained nor has the business confirmed a face match to the presented document and associated document number, resulting in a score of two out of four on the Core Identity Framework.<\/p>\n\n\n\n<p>Clearly, there\u2019s still room for improvement in achieving a more robust verification process.<\/p>\n\n\n\n<p>The examples above demonstrate how the Core Identity Framework can serve as the guiding beacon to guarantee your chosen approach encapsulates all vital elements.<\/p>\n\n\n\n<div class=\"single-cta\">\n\t<a\n\t\tclass=\"button button--primary gate-73a4cac4-f770-4131-94be-68bb435b7fab\"\n\t\trole=\"button\"\n\t\tdata-button-location=\"content_area\"\n\t\thref=\"#gate-73a4cac4-f770-4131-94be-68bb435b7fab\"\n\t>Download your free e-book, Everything you need to know about anti-money laundering<\/a>\n<\/div>\n\n\n\n\n<h2 class=\"wp-block-heading\" id=\"final\">Final thoughts<\/h2>\n\n\n\n<p>Regardless of the level of electronic check you choose, it\u2019s important to ensure that all four fundamental verification areas are covered.<\/p>\n\n\n\n<p>The ability to score four out of four within the Core Verification Framework depends on the specific processes and measures implemented by your practice for identity verification.<\/p>\n\n\n\n<p>If you can only hit two or three within the framework, then investigate how you might need to adjust your processes to tick off all four.<\/p>\n\n\n\n<p>Refer to your own identity verification practices and assess whether your current processes align with the four criteria outlined in the Core Verification Framework.<\/p>\n\n\n\n<p>Identify any gaps or areas for improvement, and make adjustments accordingly. It&#8217;s an ongoing process, and the goal is to continually enhance and adapt your procedures to ensure a thorough and secure identity verification system.<\/p>\n\n\n\n<p><\/p>\n \n<div class=\"single-cta gated-content\">\n\t<div class=\"single-cta__positioner\">\n\t\t<div class=\"single-cta__wrapper has-dark-background-color\">\n\t\t\t<div class=\"single-cta__content\">\n\t\t\t\t\t\t\t\t<h2 class=\"single-cta__title h3\">Everything you need to know about anti-money laundering<\/h2>\n\n\t\t\t\t\t\t\t\t\t<div class=\"single-cta__description\">\n\t\t\t\t\t\t<p><!-- wp:paragraph --><\/p>\n<p class=\"\">Get your free guide, which covers anti-money laundering measures that are required for all accountancy and bookkeeping practices.<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a\n\t\t\t\t\t\thref=\"#gate-73a4cac4-f770-4131-94be-68bb435b7fab\"\n\t\t\t\t\t\tclass=\"single-cta__button button button--primary\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t>Download your free e-book<\/a>\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<img decoding=\"async\" width=\"1440\" height=\"810\" src=\"https:\/\/www.sage.com\/en-gb\/blog\/wp-content\/uploads\/sites\/10\/2023\/08\/GettyImages-1325244864-1-1440x810.jpg\" class=\"single-cta__image\" alt=\"man in office\" loading=\"lazy\" srcset=\"https:\/\/www.sage.com\/en-gb\/blog\/wp-content\/uploads\/sites\/10\/2023\/08\/GettyImages-1325244864-1-1440x810.jpg 1440w\" sizes=\"auto, (min-width: 48em) 33vw, 100vw\" \/>\t\t\t<\/div>\n<\/div>\n\n\n<div class=\"single-cta\">\n\t<div class=\"single-cta__positioner\">\n\t\t<div class=\"single-cta__wrapper has-dark-background-color\">\n\t\t\t<div class=\"single-cta__content\">\n\t\t\t\t\t\t\t\t<h2 class=\"single-cta__title h3\">Subscribe to the Sage Advice newsletter<\/h2>\n\n\t\t\t\t\t\t\t\t\t<div class=\"single-cta__description\">\n\t\t\t\t\t\t<p>Join more than 500,000 UK readers and get the best business admin strategies and tactics, as well as actionable advice to help your company thrive, in your inbox every month.<\/p>\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a\n\t\t\t\t\t\thref=\"#gate-b1a63862-3fa0-4a5e-bb67-c76b88bbc6b8\"\n\t\t\t\t\t\tclass=\"single-cta__button button button--primary\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t>Subscribe now<\/a>\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<img decoding=\"async\" width=\"1440\" height=\"810\" src=\"https:\/\/www.sage.com\/en-gb\/blog\/wp-content\/uploads\/sites\/10\/2022\/04\/GettyImages-1073797282-1-1440x810.jpg\" class=\"single-cta__image\" alt=\"\" loading=\"lazy\" srcset=\"https:\/\/www.sage.com\/en-gb\/blog\/wp-content\/uploads\/sites\/10\/2022\/04\/GettyImages-1073797282-1-1440x810.jpg 1440w\" sizes=\"auto, (min-width: 48em) 33vw, 100vw\" \/>\t\t\t<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Learn about a framework that can help you strengthen anti-money laundering processes at your practice, so you can tackle identity threats.<\/p>\n","protected":false},"author":1757,"featured_media":16364,"menu_order":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_sage_video":false,"post_featured_image_hide":false,"footnotes":""},"categories":[9],"tags":[223,52],"business_type":[115],"lilypad":[],"context":[],"industry":[],"persona":[67],"imagine_tag":[220],"coauthors":[651],"class_list":["post-16969","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-strategy-legal-operations","tag-accountant-accounting","tag-security-fraud","business_type-accountants"],"sage_meta":{"region":"en-gb","author_name":"Danielle Fisher","featured_image":"https:\/\/www.sage.com\/en-gb\/blog\/wp-content\/uploads\/sites\/10\/2023\/09\/GettyImages-1369567969-1.jpg","imagine_tags":{"220":"Accountant accounting"}},"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Sage Advice UK","distributor_original_site_url":"https:\/\/www.sage.com\/en-gb\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/www.sage.com\/en-gb\/blog\/api\/wp\/v2\/posts\/16969","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sage.com\/en-gb\/blog\/api\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.sage.com\/en-gb\/blog\/api\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.sage.com\/en-gb\/blog\/api\/wp\/v2\/users\/1757"}],"replies":[{"embeddable":true,"href":"https:\/\/www.sage.com\/en-gb\/blog\/api\/wp\/v2\/comments?post=16969"}],"version-history":[{"count":0,"href":"https:\/\/www.sage.com\/en-gb\/blog\/api\/wp\/v2\/posts\/16969\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.sage.com\/en-gb\/blog\/api\/wp\/v2\/media\/16364"}],"wp:attachment":[{"href":"https:\/\/www.sage.com\/en-gb\/blog\/api\/wp\/v2\/media?parent=16969"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.sage.com\/en-gb\/blog\/api\/wp\/v2\/categories?post=16969"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.sage.com\/en-gb\/blog\/api\/wp\/v2\/tags?post=16969"},{"taxonomy":"business_type","embeddable":true,"href":"https:\/\/www.sage.com\/en-gb\/blog\/api\/wp\/v2\/business_type?post=16969"},{"taxonomy":"lilypad","embeddable":true,"href":"https:\/\/www.sage.com\/en-gb\/blog\/api\/wp\/v2\/lilypad?post=16969"},{"taxonomy":"context","embeddable":true,"href":"https:\/\/www.sage.com\/en-gb\/blog\/api\/wp\/v2\/context?post=16969"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/www.sage.com\/en-gb\/blog\/api\/wp\/v2\/industry?post=16969"},{"taxonomy":"persona","embeddable":true,"href":"https:\/\/www.sage.com\/en-gb\/blog\/api\/wp\/v2\/persona?post=16969"},{"taxonomy":"imagine_tag","embeddable":true,"href":"https:\/\/www.sage.com\/en-gb\/blog\/api\/wp\/v2\/imagine_tag?post=16969"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.sage.com\/en-gb\/blog\/api\/wp\/v2\/coauthors?post=16969"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}