Compliance Framework
We provide our clients with tools to define, verify, and enforce their own compliance policies. User onboarding requirements are delineated by a Policy, administered by a Policy Owner.
Data Collection Flow
Definition: Datapoints are pieces of information collected about users during onboarding. These can be individual data fields or entire documents. datapoints
serve as the foundational building blocks of Keyring's custom standard language. They can be collected through:
Forms (or questionnaires) as part of Keyring Pro
Data extraction (via TLSN) as part of Keyring Connect
Rule Validation
Definition: Rules are evaluations performed on Datapoints to determine whether a user is valid or "attestation-ready" for a given Policy. These evaluations are framed as questions and return a boolean value (true
or false
).
Keyring Pro uses two main Rules:
Is the user considered valid according to the Policy Owner who has reviewed the onboarding?
Has the user provided all required Datapoints according according to the Data Collection Flow?
Keyring Connect features a validation module that performs automated checks on collected Datapoints, such as:
Is the user's registration address in a FATF blacklisted country?
Is the user's residential address in the US?
Is the user above 21 years old?
Is the user's KYC level above a certain threshold?
A Policy can combine both Pro and Connect.
Policy
Definition: A Policy is defined by a unique immutable ID and administered by the Policy Owner. It is upgradable and contains the following elements:
Rule, as specified above.
Refresh Rate, specifying the period of validity before results have to be refreshed.
Regulatory backdoor, specifying the conditions for de-anonymisation (more here).
Policy Owners are customers of Keyring. They are responsible for defining and operating their Policy according to their regulatory standards. They also make the ultimate decision on users' attestation-ready status.
Last updated