Customer Identification Requirements
Detail the documents and information required for identity verification. Use a table listing document types, acceptable forms, and verification methods for both individuals and entities.
Free Finance Template
Customer due diligence for [account type]
Use this template to customer due diligence for [account type].
| Field | Details |
|---|---|
| Category | Finance |
| Owner | [Team or owner] |
| Version | [Version number] |
| Effective Date | [Date] |
| Review Cycle | [Monthly / Quarterly / Annual / Event-based] |
| Status | [Draft / In Review / Approved] |
Detail the documents and information required for identity verification. Use a table listing document types, acceptable forms, and verification methods for both individuals and entities.
| Item | Details | Owner | Status |
|---|---|---|---|
| [Item or requirement] | [Describe the relevant detail, evidence, or decision] | [Owner] | [Open / Complete] |
| [Item or requirement] | [Describe the relevant detail, evidence, or decision] | [Owner] | [Open / Complete] |
[Add context, assumptions, exceptions, evidence links, screenshots, calculations, or reviewer comments.]
Define the risk categories (low, medium, high, prohibited) and the factors that determine each score. Use a table mapping risk factors to point values and thresholds.
| Item | Details | Owner | Status |
|---|---|---|---|
| [Item or requirement] | [Describe the relevant detail, evidence, or decision] | [Owner] | [Open / Complete] |
| [Item or requirement] | [Describe the relevant detail, evidence, or decision] | [Owner] | [Open / Complete] |
[Add context, assumptions, exceptions, evidence links, screenshots, calculations, or reviewer comments.]
List the specific conditions that trigger EDD, such as PEP status, high-risk jurisdictions, unusual transaction patterns, and adverse media hits.
| Item | Details | Owner | Status |
|---|---|---|---|
| [Item or requirement] | [Describe the relevant detail, evidence, or decision] | [Owner] | [Open / Complete] |
| [Item or requirement] | [Describe the relevant detail, evidence, or decision] | [Owner] | [Open / Complete] |
[Add context, assumptions, exceptions, evidence links, screenshots, calculations, or reviewer comments.]
Describe the continuous monitoring requirements including transaction monitoring thresholds, periodic review schedules, and trigger events for re-assessment.
| Item | Details | Owner | Status |
|---|---|---|---|
| [Item or requirement] | [Describe the relevant detail, evidence, or decision] | [Owner] | [Open / Complete] |
| [Item or requirement] | [Describe the relevant detail, evidence, or decision] | [Owner] | [Open / Complete] |
[Add context, assumptions, exceptions, evidence links, screenshots, calculations, or reviewer comments.]
Document the criteria for filing Suspicious Activity Reports, including red flags, escalation procedures, timelines, and record-keeping requirements. Use tables extensively. Reference applicable regulations (BSA, USA.
| Item | Details | Owner | Status |
|---|---|---|---|
| [Item or requirement] | [Describe the relevant detail, evidence, or decision] | [Owner] | [Open / Complete] |
| [Item or requirement] | [Describe the relevant detail, evidence, or decision] | [Owner] | [Open / Complete] |
[Add context, assumptions, exceptions, evidence links, screenshots, calculations, or reviewer comments.]
Document review conclusions, approvals, unresolved items, and next review date.
| Role | Name | Date | Notes |
|---|---|---|---|
| Preparer | [Name] | [Date] | [Notes] |
| Reviewer | [Name] | [Date] | [Notes] |
| Approver | [Name] | [Date] | [Notes] |
Template Structure
Use this finance template as a starting point, then customize each section to match your internal workflow, evidence, and signoff needs.
Detail the documents and information required for identity verification. Use a table listing document types, acceptable forms, and verification methods for both individuals and entities.
Define the risk categories (low, medium, high, prohibited) and the factors that determine each score. Use a table mapping risk factors to point values and thresholds.
List the specific conditions that trigger EDD, such as PEP status, high-risk jurisdictions, unusual transaction patterns, and adverse media hits.
Describe the continuous monitoring requirements including transaction monitoring thresholds, periodic review schedules, and trigger events for re-assessment.
Document the criteria for filing Suspicious Activity Reports, including red flags, escalation procedures, timelines, and record-keeping requirements. Use tables extensively. Reference applicable regulations (BSA, USA.
Write a KYC/AML Procedure document in a formal, regulatory-compliant tone. Structure with:
Detail the documents and information required for identity verification. Use a table listing document types, acceptable forms, and verification methods for both individuals and entities.
Define the risk categories (low, medium, high, prohibited) and the factors that determine each score. Use a table mapping risk factors to point values and thresholds.
List the specific conditions that trigger EDD, such as PEP status, high-risk jurisdictions, unusual transaction patterns, and adverse media hits.
Describe the continuous monitoring requirements including transaction monitoring thresholds, periodic review schedules, and trigger events for re-assessment.
Document the criteria for filing Suspicious Activity Reports, including red flags, escalation procedures, timelines, and record-keeping requirements.
Use tables extensively. Reference applicable regulations (BSA, USA PATRIOT Act, FATF). Be precise about thresholds and timelines.
Document ID: KYC-CORP-001 | Effective Date: 2026-01-15 | Owner: BSA/AML Compliance Officer
All corporate account applicants must provide the following documentation before account activation:
| Requirement | Acceptable Documents | Verification Method |
|---|---|---|
| Entity formation | Articles of incorporation, partnership agreement | Secretary of State registry lookup |
| Beneficial ownership (>25%) | Government-issued photo ID for each UBO | Identity verification service + manual review |
| Tax identification | IRS EIN confirmation letter (CP 575) | IRS TIN matching |
| Operating address | Utility bill or lease agreement (<90 days) | Physical address verification |
| Board resolution | Signed authorization to open account | Notarized original or certified copy |
Each account is assigned a composite risk score at onboarding:
| Risk Factor | Low (1 pt) | Medium (3 pts) | High (5 pts) |
|---|---|---|---|
| Entity type | Public company | Private LLC | Shell company, trust |
| Jurisdiction | US domestic | FATF member state | FATF grey/black list |
| Industry | Healthcare, education | Real estate, import/export | MSB, casino, cryptocurrency |
| Expected activity | <$50K/month | $50K–$500K/month | >$500K/month |
| Source of funds | Operating revenue | Investment proceeds | Third-party or foreign-sourced |
Score thresholds: 5–8 = Low Risk, 9–15 = Medium Risk, 16–20 = High Risk, 21+ = Escalate to BSA Officer.
EDD is required when any of the following conditions are present:
| Review Type | Frequency | Scope | Owner |
|---|---|---|---|
| Transaction monitoring | Real-time | All debits/credits against thresholds | Automated system |
| Periodic KYC refresh | Annual (high), Biennial (medium), Triennial (low) | Full CIP re-verification | KYC Analyst |
| Sanctions screening | Daily batch + real-time | OFAC SDN, EU, UN consolidated lists | Compliance system |
| Negative news screening | Monthly | All beneficial owners and entity | Third-party vendor |
A Suspicious Activity Report must be filed within 30 calendar days of detection when:
Record a walkthrough, training session, or process demonstration. Docsie AI turns it into structured documentation using this template as the starting framework.
Use the template manually, or let Docsie generate the first draft from source footage.
Portfolio review template for [client type]
Risk evaluation for [loan/product type]
Product documentation for [financial product]
Controls for [process/department]
Investment guidelines for [fund/portfolio]
Filing procedures for [regulation/report]
Template FAQ
Common questions about using and generating a kYC/AML Procedure.
Q: What is a kYC/AML Procedure?
A: A kYC/AML Procedure is a structured document for customer due diligence for [account type].
Q: Can I download this kYC/AML Procedure as Word or PDF?
A: Yes. This page includes free downloads in DOCX, PDF, and Markdown formats so you can edit, share, or import the template into your documentation system.
Q: Can Docsie generate this from a video?
A: Yes. Upload a process walkthrough, training recording, or screen capture to Docsie, then use this template structure to generate a first draft automatically.