Customer Identification Program (KYC) Requirements

📅 Updated Dec 2025 ⏱ 15 min read 👤 KYC Compliance

CIP Requirements Under BSA

The Customer Identification Program (CIP) is a cornerstone of Anti-Money Laundering (AML) compliance under the Bank Secrecy Act (BSA). If you operate as a Money Services Business (MSB), broker-dealer, investment adviser, or cryptocurrency exchange, you're legally required to implement robust customer identification procedures.

CIP requirements stem from Section 326 of the USA PATRIOT Act, which amended the BSA to mandate that financial institutions verify the identity of any person seeking to open an account.

⚠ Legal Requirement, Not Optional

Failure to implement adequate KYC/CIP procedures can result in enforcement actions, civil penalties, criminal prosecution, and loss of regulatory licenses. FinCEN and state regulators actively examine MSBs for CIP compliance.

📚 31 CFR 1020.220 - Customer Identification Programs

Requires MSBs to implement a written CIP that includes risk-based procedures for:

  • Collecting identifying information at account opening
  • Verifying customer identity using documentary or non-documentary methods
  • Maintaining records of information used to verify identity
  • Determining whether the customer appears on any terrorist watch lists

Customer Information to Collect

At a minimum, you must collect the following information for every customer before opening an account or establishing a relationship:

✅ Required Customer Information

Full Legal Name

Individual's full name as it appears on government-issued ID, or legal entity name as registered with authorities

Date of Birth (Individuals)

Required for natural persons to verify identity and screen against OFAC lists

Physical Address

Street address of residence or business. PO boxes alone are insufficient for individuals

Identification Number

For US persons: SSN or EIN. For foreign persons: passport number, alien ID, or other government-issued ID number

Entity Information (If Applicable)

For businesses: formation documents, EIN, registered agent, business type, ownership structure

💡 Risk-Based Approach

While these are minimums, you should collect additional information based on risk. Higher-risk customers (large transaction volumes, international transfers, PEPs) warrant Enhanced Due Diligence (EDD) with additional documentation.

Identity Verification Methods

Collecting information is only half the battle. You must also verify that the information is accurate and that the customer is who they claim to be. The BSA permits two primary verification methods:

Documentary Verification

Examining documents that provide evidence of identity, such as:

Non-Documentary Verification

Using third-party data sources or procedures to verify identity:

⚠ Documentary vs Non-Documentary

Documentary methods are generally more reliable for initial verification. Non-documentary methods should be used when documents are unavailable, to supplement documentary verification, or when additional verification is necessary due to heightened risk.

Documentary vs Non-Documentary Verification

MethodAdvantagesDisadvantagesBest For
Documentary Direct evidence
Visual verification
Widely accepted
Manual review required
Document fraud risk
Slower processing
High-risk customers
Large transactions
Regulatory preference
Non-Documentary Faster processing
Scalable automation
Real-time results
Less direct evidence
Database accuracy risk
May require backup docs
Lower-risk customers
Digital onboarding
Supplemental checks

Beneficial Ownership Rules

When your customer is a legal entity (corporation, LLC, partnership), you must identify and verify the identity of the beneficial owners under FinCEN's Beneficial Ownership Rule (31 CFR 1010.230).

Who Qualifies as a Beneficial Owner?

You must identify individuals who meet either of these criteria:

Ownership ProngControl Prong
Any individual who owns 25% or more of the equity interests in the legal entity A single individual with significant management control over the entity (CEO, CFO, President, etc.)

Required Beneficial Owner Information

💡 Maximum of 5 Beneficial Owners

Under the rule, you'll typically identify between 1-5 beneficial owners: up to 4 individuals meeting the ownership threshold (25%+), and 1 individual with significant control.

Exemptions from Beneficial Ownership Requirements

The following entity types are exempt:

Enhanced Due Diligence (EDD)

For higher-risk customers, standard KYC is insufficient. Enhanced Due Diligence requires additional scrutiny, documentation, and ongoing monitoring.

Risk-Based EDD Triggers

Risk FactorEDD Considerations
High Transaction Volume Source of funds verification, business justification, ongoing transaction monitoring
Politically Exposed Persons (PEPs) Source of wealth documentation, ongoing adverse media screening, senior management approval
High-Risk Jurisdictions FATF high-risk country list, sanctions screening, enhanced address verification
Cash-Intensive Businesses Business licenses, premises verification, SAR filing consideration
Anonymous Activity Indicators IP analysis, device fingerprinting, behavior analytics, possible account closure
Crypto Mixing/Tumbling Blockchain analysis, source of funds, transaction pattern review

EDD Documentation Requirements

⚠ PEP Requirements

Politically Exposed Persons require special handling. You must obtain senior management approval before establishing a relationship with a PEP, and conduct ongoing enhanced monitoring throughout the relationship.

Ongoing Monitoring Requirements

KYC is not a one-time event. You must continuously monitor customer activity to:

Periodic KYC Refresh Schedule

Customer Risk LevelRefresh FrequencyTrigger Events
Low Risk Every 3-5 years Material change in activity, address change
Medium Risk Every 1-2 years Significant transaction increase, new business line
High Risk Annually or more Any material change, adverse media, unusual activity

Transaction Monitoring

Implement automated systems to flag:

KYC for Crypto Trading Platforms

Cryptocurrency exchanges and trading platforms face unique KYC challenges due to the pseudonymous nature of blockchain transactions.

Crypto-Specific KYC Elements

⚠ Travel Rule Challenges

FinCEN's Travel Rule requires collecting and transmitting customer information for crypto transfers over $3,000. However, many crypto platforms lack standardized mechanisms for exchanging this data, creating compliance challenges.

Crypto KYC Red Flags

Red FlagRiskResponse
Deposits from mixing services Money laundering Enhanced monitoring, possible SAR, account restrictions
Rapid buying and withdrawal Structuring, layering Transaction holds, additional verification
P2P exchange patterns Unlicensed MSB activity Source of funds inquiry, possible account closure
Multiple accounts, same IP Account fraud, limit evasion Device fingerprinting, consolidation or termination

Third-Party KYC Providers

Most platforms use third-party vendors to streamline identity verification. While you can outsource the process, you cannot outsource the liability—ultimate responsibility remains with you.

KYC Vendor Comparison

ProviderCapabilitiesBest ForTypical Cost
Jumio ID verification, biometric matching, liveness detection, AML screening Global platforms, high fraud risk $1-3 per verification
Onfido Document verification, facial recognition, watchlist screening Digital-first companies, mobile onboarding $1-2 per check
Trulioo Global identity verification, business verification, ongoing monitoring International expansion, emerging markets $0.50-2 per verification
Sumsub Full KYC/AML suite, transaction monitoring, case management Crypto exchanges, fintech startups $0.50-1.50 per check
ComplyAdvantage AML screening, sanctions lists, PEP detection, adverse media Risk and compliance teams, ongoing monitoring Custom enterprise pricing
Chainalysis KYT Blockchain transaction monitoring, risk scoring, sanctions screening Crypto-native platforms, DeFi compliance Custom based on volume

Vendor Due Diligence

Before selecting a KYC provider, evaluate:

💡 Multi-Vendor Strategy

Many platforms use multiple vendors: one for automated ID verification, another for AML screening, and a third for blockchain analytics. This reduces single points of failure and leverages best-of-breed solutions.

CIP Recordkeeping Requirements

You must maintain records of all information obtained through your CIP for 5 years after the account is closed.

Required Records

Record TypeContentsRetention Period
Identifying Information Name, address, DOB, ID number collected at account opening 5 years after closure
Verification Documentation Copies of IDs, utility bills, database reports, verification methods used 5 years after closure
Verification Results Whether identity was verified, date, methods used, any discrepancies 5 years after closure
Beneficial Ownership Certification form, supporting documentation for beneficial owners 5 years after closure
Enhanced Due Diligence Source of wealth/funds documentation, risk assessments, approval records 5 years after closure
Ongoing Monitoring KYC refresh documentation, transaction monitoring alerts, SAR decisions 5 years after event

Record Format and Accessibility

⚠ Privacy Law Conflicts

GDPR and CCPA grant users the "right to be forgotten," but BSA recordkeeping requirements mandate 5-year retention. Your privacy policy should clearly state that deletion requests are subject to legal retention obligations.

Written CIP Documentation

You must maintain a written CIP that is approved by your board or senior management. This document should include:

Implementation Checklist

To build a compliant KYC/CIP program:

  1. Draft Written CIP - Document your procedures in a formal policy
  2. Obtain Board Approval - Get senior management or board sign-off on CIP
  3. Select Verification Methods - Choose documentary, non-documentary, or hybrid approach
  4. Choose KYC Vendors - Conduct vendor due diligence and contract negotiations
  5. Integrate Systems - Build KYC into onboarding flow and backend systems
  6. Implement OFAC Screening - Screen against SDN list and other watchlists
  7. Build Risk-Rating Model - Create criteria for low, medium, high risk classification
  8. Develop EDD Procedures - Define triggers and documentation for enhanced due diligence
  9. Create Ongoing Monitoring - Set up transaction monitoring and periodic KYC refresh
  10. Establish Recordkeeping - Implement 5-year retention for all CIP records
  11. Train Staff - Ensure compliance team understands CIP requirements
  12. Test and Audit - Conduct independent testing of CIP effectiveness
Disclaimer: This guide provides general information about KYC/CIP requirements for trading platforms and MSBs. Requirements vary based on your specific business model, jurisdictions, and regulatory status. Consult with AML/BSA counsel to ensure your CIP meets all applicable requirements.