elDAS Regulation Blog elDAS Regulation The eIDAS regulation establishes common standards for electronic identification and authentication Read more
KYC for legal entities Blog KYC for legal entities KYC for legal entities is a process of verifying the identity of companies Read more
The European Digital Identity Wallet (e-wallet): definition, ambitions and use cases Blog The European Digital Identity Wallet (e-wallet): definition, ambitions and use cases Digital identity, defined as all the data allowing a person to be identified Read more
AML5 Directive Blog AML5 Directive Adopted in 2018, AML5 aims to combat money laundering and terrorist financing Read more
The GDPR, a revolution in the protection of personal data Blog The GDPR, a revolution in the protection of personal data The GDPR, or General Data Protection Regulation, aims to protect personal information Read more
Remote verification Blog Remote verification Remote verification uses digital technologies to confirm an individual's identity Read more
Intelligent Document Processing (IDP): automate your document management with AI Blog Intelligent Document Processing (IDP): automate your document management with AI Intelligent Document Processing (IDP) uses AI to automate extraction and processing Read more
The Fight Against Money Laundering and the Financing of Terrorism (LCB-FT) Blog The Fight Against Money Laundering and the Financing of Terrorism (LCB-FT) AML-FT (Fight Against Money Laundering and Financing of Terrorism) constitutes a Read more
Dematerialized mail: definition Blog 1 minutes Dematerialized mail: definition Dematerialized mail is a method of mail management which consists of digitizing documents Read more