The Top 10  Most Difficult Countries for Identity Verification

The Top 10  Most Difficult Countries for Identity Verification

Download Report

    n-img-roi-cross

    Before You Go, Schedule Your Free Demo Today

    Valid Invalid number


    Note: Fields marked with an asterisk(*) are mandatory.

    n-exit-img-roi-cross

    Thank you for your demo request

    We appreciate your interest and look forward to discussing how our solution can meet your needs. Expect to hear from us shortly with scheduling details.

    Close

    Indonesia’s First-ever Comprehensive Law on Data Privacy – the PDP Bill

    sp infographic 26th july 2021-02

    Being the largest economy in Southeast Asia, Indonesia is experiencing enormous growth in the digital ecosystem. By 2020, the country had 338.2 million mobile connections, 175.4 million internet users, and 160.0 million social media users. However, this growth has introduced challenges for ensuring personal data protection (PDP). 

    With personal data leaks, data thefts, and ID fraud becoming a recurring problem, the Indonesian government submitted the PDP Draft Bill to the Chairperson of the Indonesian House of Representatives in 2020. The bill is set to become law later this year, introducing key updates such as data transfer rules, ownership rights, data processing guidance and much more. This blog will shed a light on the highlights of the PDP bill. 

    Why is the Indonesian PDP Law Important? 

    While there are several personal data protection laws existing in the country, they remain scattered under various regulations. The main point of reference for data protection is the Law on Electronic Information and Transactions in Indonesia. The PDP law will become the first Indonesian law that includes specific, comprehensive guidance regarding the protection of personal data via both, electronic and non-electronic systems. 

    Secondly, it should be noted that the legislation is based on the EU’s General Data Protection Regulation (GDPR). This means that businesses and consumers within Indonesia will be subject to the same data rights and processing procedures as the EU.  

    Who Does it Apply to?

    The Personal Data Protection law will be applicable to all business entities that deal with the personal data of Indonesian citizens, regardless of their geographical location. These business entities can fall in either category, private or public sector, whether located aboard or within Indonesia. The primary aim of the law is to protect all sensitive information being processed manually or digitally by individuals or corporations. 

    Key Takeaways of the PDP Law

    Indonesia’s updated data protection bill will soon be introducing changes to revamp the country’s data privacy rules. Here is a brief summary of the PDP law.

    sp infographic 26th july 2021-01-01-01

    1- Personal Data Definition and Categories

    The definition of personal data mirrors the definition provided by the EU’s General Data Protection Regulation. Additionally, the type of data has been subdivided into two main categories; general and specific.

    • General Personal Data: This includes data such as an individual’s full name, age, religion, and citizenship ​which is collected for the purpose of identity verification.
    • Specific Personal Data: This type of data includes financial information, healthcare data, biometric information, genetic data, life/sexual orientation, political stance, criminal records, child data, and so on. 

    2- Rights of Personal Data Owners

    While the rights of personal data owners were not explicitly explained previously, the updated draft outlines eleven rights, similar to the ones mentioned under the GDPR. This includes the right to terminate the processing of personal data, deletion of personal data, the right to sue and receive compensation over data privacy violations, and much more. 

    3- Identification of Key Roles

    The PDP law separates the roles of “data controller” and “data processor”. 

    • Personal Data Controller (PDC): This is the party responsible for determining the purpose of collecting data, processing the personal data, and defining its retention period. Before data processing begins, the PDC is required to obtain consent from the Personal Data Owner, either in written or recorded form. 
    • Personal Data Processor (PDPr): This party processes the information collected on the behalf of the data controller. 

    4- Appointment of a Data Protection Officer

    To ensure that the data collected is being used for public service, both the PDC and PDPr are required to appoint a data protection officer. In addition to this, the data protection officer will also be responsible for ensuring the PDC implements activities for regular monitoring of personal data and the processing of large-scale personal data related to criminal offences.

    5- Transfer of Personal Data 

    The transfer of personal data between two PDCs have been permitted, provided that the consent has been obtained from the personal data owner and the transfer is done in accordance with the PDP Bill. For transferring data outside Indonesia, two requirements need to be met. Firstly, the receiving country must have a law equivalent to, or higher than the PDP bill. Secondly, there must be a treaty between the receiving country and Indonesia. 

    6- Administrative and Criminal Sanctions

    Two types of sanctions have been introduced for parties that fail to comply with the PDP Bill. These include the following:

    • Administrative Sanctions:  forms: a written warning, temporary halt of processing personal data, deletion or destruction of personal data, compensation, and administrative fines. 
    • Criminal Sanctions: Misconduct of personal data privacy can lead to imprisonment for up to seven years and confiscation of assets, on top of fines up to 70 Billion IDR (US$4.8 million). 

    How To Maintain Compliance with the Personal Data Protection Bill 

    To stay compliant with the PDP bill, entities will be given two years to implement necessary policies and procedures. The following action plans can be implemented to stay compliant.

    • Review the current data protection procedures to ensure end-to-end data protection
    • Review current contracts/consent with customers to include all the necessary clauses, such as the data owner’s rights, data transfer regulations, obligations when processing personal data, etc. 
    • Assess the business processes to ascertain the implementation of adequate procedures
    • Ascertain proper implementation of PDP law by third parties to secure the collection and processing of personal data
    • Invest in RegTech technologies and software to streamline compliance with regulatory requirements by automating compliance procedures 

    Summing it up

    The GDPR-influenced Personal Data Protection Bill is soon to be introduced this year and is set to become Indonesia’s first comprehensive law on data privacy. This is a step in the right direction, given the vast crimes committed through breach of confidential data. By acknowledging the rights of the stakeholders involved, introducing precise sets of definitions, and presenting non-compliance penalties, the PDP bill is on its way to becoming one of the strongest data privacy laws among the fourteen Asian countries which currently have such laws in place. 

    Need more information? Talk to our experts!

    Related Posts

    Blog

    Online Dating Activities, Surging Crimes and Shufti’s IDV Solution

    Matchmaking is considered one of the oldest industries in existence, online dating is now having ...

    Online Dating Activities, Surging Crimes and Shufti’s IDV Solution Explore More

    Blog

    Need for Identity Verification in Real Estate and Its Real-World Use Cases

    The real estate industry is in dire need of identity verification processes. The reason being, th...

    Need for Identity Verification in Real Estate and Its Real-World Use Cases Explore More

    Blog

    Identity Fraud and Risk Assessment: An Ultimate Guide for 2023

    Customer onboarding and business relationships always come with associated risks that must be han...

    Identity Fraud and Risk Assessment: An Ultimate Guide for 2023 Explore More

    Blog

    The Complete Guide | Identifying Fake Documents

    Many application processes have become easier and faster due to digital transformation. This is b...

    The Complete Guide | Identifying Fake Documents Explore More

    Blog

    Securing Instant Money Transfers in the Banking Sector – EPC’s New Rulebook

    Financial services have always played a vital role throughout the entire history of advanced huma...

    Securing Instant Money Transfers in the Banking Sector – EPC’s New Rulebook Explore More

    Blog

    Don’t Need AML Compliance? Think Again!

    The majority of the businesses believe that they do not need to comply with AML regulations at al...

    Don’t Need AML Compliance? Think Again! Explore More

    Blog

    Business Verification: A new line of Defense against Fraudsters

    With the ever-increasing complexities of anti-money laundering (AML) and counter-terrorism financ...

    Business Verification: A new line of Defense against Fraudsters Explore More

    Blog

    Anti-Money Laundering (AML) Solutions – Securing Luxury Goods and Curbing Financial Crimes

    Exotic cars, designer clothes, artifacts, and private jets make attractive news headlines and mov...

    Anti-Money Laundering (AML) Solutions – Securing Luxury Goods and Curbing Financial Crimes Explore More

    Blog

    Safeguarding the Art Market with Shufti’s AML Screening Solution

    Non-fungible tokens (NFTs), blockchain-powered title deeds tied to a virtual or physical asset, h...

    Safeguarding the Art Market with Shufti’s AML Screening Solution Explore More

    Blog, Identity & KYC

    Merchant Identity Proofing: Building Strong B2B Relations

    Identity Proofing: The success of e-commerce has been very remarkable. It is expected that global...

    Merchant Identity Proofing: Building Strong B2B Relations Explore More

    Blog, Identity & KYC

    Digital ID Verification

      The Current Situation Digital ID Verification is the key to securing your business in thes...

    Digital ID Verification Explore More

    Blog

    Understanding the Difference Between Money Laundering and Embezzlement

    Money laundering and embezzlement are two financial offences involving the movement of significan...

    Understanding the Difference Between Money Laundering and Embezzlement Explore More

    Blog

    Why KYC Solutions are becoming a norm in Cryptocurrency?

    KYC Solutions provide a great opportunity for crypto exchanges and virtual currency enthusiasts t...

    Why KYC Solutions are becoming a norm in Cryptocurrency? Explore More

    Blog

    How Two-Factor Authentication Enhances the Security of Digital Business Platforms

    Considering the recent trends in fraudulent activities, it is evident that social engineering and...

    How Two-Factor Authentication Enhances the Security of Digital Business Platforms Explore More

    Blog

    Third-party Due Diligence – Red Flags, Regulations and 5 Ways to Enhance It

    The majority of businesses depend upon a third-party in one way or the other. Contractors, suppli...

    Third-party Due Diligence – Red Flags, Regulations and 5 Ways to Enhance It Explore More

    Blog

    GDPR Checklist – Practices to adopt as Business Norms

    It’s been a little over eight months since the GDPR came into effect on 25 May 2018. From that po...

    GDPR Checklist – Practices to adopt as Business Norms Explore More

    Blog

    Compliance and conversions don’t have to be at odds

    Compliance and conversions don’t have to be at odds Explore More

    Blog

    Age Gating VS Age Verification | Enhancing Security for Minors

    Age gating was once employed to stop minors from accessing age-restricted content. However, the a...

    Age Gating VS Age Verification | Enhancing Security for Minors Explore More

    Blog

    AML Screening for Luxury Items Industry – The Role of Shufti in Ensuring Compliance

    Money laundering is a global issue, and with emerging technologies, criminals are also using more...

    AML Screening for Luxury Items Industry – The Role of Shufti in Ensuring Compliance Explore More

    Blog

    KYC Verification – The Need for Customer Due Diligence in Co-Working Spaces

    The development of coworking platforms has led to a business transformation that brings security ...

    KYC Verification – The Need for Customer Due Diligence in Co-Working Spaces Explore More

    Blog

    KYC, KYB & KYT Tying the Loops for Identity Verification

    Digital fraudulent activities are rising with every passing day, businesses are adopting reactive...

    KYC, KYB & KYT Tying the Loops for Identity Verification Explore More

    Blog

    E-commerce Frauds – Common types and Prevention tips

    What are some common e-commerce frauds and how can you prevent them? Is the buyer on your site an...

    E-commerce Frauds – Common types and Prevention tips Explore More

    Blog

    Beyond the Blue Checkmark – Online Age Verification Solution to Secure Minors’ Identity

    As minors are going online and utilizing digital services as well as smart gadgets more frequentl...

    Beyond the Blue Checkmark – Online Age Verification Solution to Secure Minors’ Identity Explore More

    Blog

    FinTech and FinCrime – The Global Regulatory Landscape

    Also known as financial technology, FinTech is now among the fastest-growing industries. This sec...

    FinTech and FinCrime – The Global Regulatory Landscape Explore More

    Anti Money Laundering, Blog, Business Technology, Financial Crime / AML, Identity & KYC

    Global Economies are joining forces with FATF against money laundering

    Financial Action Task Force (FATF) has been very keen on eliminating financial crime (money laund...

    Global Economies are joining forces with FATF against money laundering Explore More

    Blog

    Transaction Monitoring – Establishing A Defense Mechanism Against Financial Crime

    With the rapid increase in the global volume of monetary transactions, money laundering methods a...

    Transaction Monitoring – Establishing A  Defense  Mechanism Against Financial Crime Explore More

    Blog

    KYC & AML Regulations in the UK: An Ultimate Guide

    Financial crimes have been around since the invention of money. Some argue that their origins are...

    KYC & AML Regulations in the UK: An Ultimate Guide Explore More

    Blog

    Securing Instant Money Transfers in the Banking Sector – EPC’s New Rulebook

    Financial services have always played a vital role throughout the entire history of advanced huma...

    Securing Instant Money Transfers in the Banking Sector – EPC’s New Rulebook Explore More

    Blog

    European Payments Initiative Calling for IDV Solutions

    The rise in the popularity of Visa and Mastercard in Europe, both US-headquartered companies, was...

    European Payments Initiative Calling for IDV Solutions Explore More

    Blog, Identity & KYC

    Fathoming Financial Inclusion, Innovative KYC Solutions, and Integrity

    Identity – ensures active participation of an individual in social, political and economic ...

    Fathoming Financial Inclusion, Innovative KYC Solutions, and Integrity Explore More

    Blog

    Identity verification solutions to fight against faces of fraud

    In this digital world, billions of smart devices are circulating, connecting and communicating wi...

    Identity verification solutions to fight against faces of fraud Explore More

    Blog, Reg Tech

    Shufti GDPR Review 2018: How we protected our clients from regulatory fines?

    Shufti stands out in KYC industry not only because of its highly customizable and global iden...

    Shufti GDPR Review 2018: How we protected our clients from regulatory fines? Explore More

    Blog

    De-Risking and Anti-Money Laundering Screening – How Shufti Can Help FIs

    Every firm providing financial services must stay put with the existing compliance and follow new...

    De-Risking and Anti-Money Laundering Screening – How Shufti Can Help FIs Explore More

    Blog

    Securing Business Operations with Risk Assessment

    The increasing connectivity and dependence of the world on technology have led to a rise in sophi...

    Securing Business Operations with Risk Assessment Explore More

    Blog

    Top 5 Most Common Identity Fraud Attempts in 2021

    Fraudsters in the post-pandemic world took complete advantage of rapid digitization. Bad actors b...

    Top 5 Most Common Identity Fraud Attempts in 2021 Explore More

    Blog

    KYC and AML For Fintech | A Comprehensive Guide to Fraud Prevention

    Since governments worldwide are increasing the pressure to regulate, compliance has become a key ...

    KYC and AML For Fintech | A Comprehensive Guide to Fraud Prevention Explore More

    Blog

    Why online alcohol industry needs robust age verification solutions?

    “Can I see some ID?” The question brick and mortar booze stores ask or at least should ask to ver...

    Why online alcohol industry needs robust age verification solutions? Explore More

    Blog

    KYC ID Verification – A Critical Component for Securing Online Dating Activities

    Social manipulation in online dating platforms targets numerous users and their personal informat...

    KYC ID Verification – A Critical Component for Securing Online Dating Activities Explore More

    Blog

    A Statistical Analysis of Prevalent Crimes in the Global Financial Industry – [2022 Overview]

    Over the past few years, the financial industry has witnessed significant technological changes, ...

    A Statistical Analysis of Prevalent Crimes in the Global Financial Industry – [2022 Overview] Explore More

    Blog

    NFC Verification – Securing Large-scale Events from Frauds

    Large-scale events are a great way for imposters to execute their illicit plans. Data breaches, m...

    NFC Verification – Securing Large-scale Events from Frauds Explore More

    Blog

    Top Cryptocurrency Trends to Look Out for in 2022

    2021 has been a remarkable year for cryptocurrency as because of COVID-19 outbreak crypto industr...

    Top Cryptocurrency Trends to Look Out for in 2022 Explore More

    Blog

    5 Ways Facial Biometric Technology Elevates Customer Retention

    Today, biometric technology is known for its ease of use and reliability. Facial biometrics have ...

    5 Ways Facial Biometric Technology Elevates Customer Retention Explore More

    Blog

    Instant Client Onboarding with E-KYC Screening

    Technological Advancement and its Influence The world needs to constantly evolve in order to surv...

    Instant Client Onboarding with E-KYC Screening Explore More

    Blog, Financial Crime / AML

    What is PEP Compliance and Why do Financial Institutions Need it?

    For Politically Exposed Persons (PEPs), an inter-governmental body established in 1989, Financial...

    What is PEP Compliance and Why do Financial Institutions Need it? Explore More

    Blog, Online Marketplace

    Fraud Prevention in Real Estate Industry

    Fraud prevention tools that include3rd-party KYC service providers are essential in the real esta...

    Fraud Prevention in Real Estate Industry Explore More

    Blog, Identity & KYC

    GDPR versus Identity Verification – Are you Ready?

    If you are an organisation that is based in the EU or are doing business with companies in the EU...

    GDPR versus Identity Verification – Are you Ready? Explore More

    Blog

    Identity Verification Forecast: How Will KYC Evolve in 2023?

    As the world becomes more digital, scammers are honing their craft and employing trickier techniq...

    Identity Verification Forecast: How Will KYC Evolve in 2023? Explore More

    Blog

    Romance Scams: The Dark Side of ChatGPT and How to Stay Safe

    The voice one hears on the other end of a telephone call may not be an earthling, the person one ...

    Romance Scams: The Dark Side of ChatGPT and How to Stay Safe Explore More

    Blog

    Addressing the Challenge of Money Laundering Risks for Payment Service Providers (PSPs)

    During the last few decades, the financial industry has altogether revolutionized, and digital tr...

    Addressing the Challenge of Money Laundering Risks for Payment Service Providers (PSPs) Explore More

    Blog

    Singapore’s Digital Payment Token and AML Regulations [2022 Updates]

    Financial crimes are an ever-increasing threat to the global economic climate. As a financial hub...

    Singapore’s Digital Payment Token and AML Regulations [2022 Updates] Explore More

    Blog

    KYC and AML Compliance – Addressing the Challenge of Money Laundering in Online Trading Platforms

    An online trading platform is a program where shareholders and traders deal through financial int...

    KYC and AML Compliance – Addressing the Challenge of Money Laundering in Online Trading Platforms Explore More

    Blog

    Know Your Player | Onboard Verified Gamers and Scale Globally

    In today’s digitised gaming world, player verification stands as a cornerstone for onboarding leg...

    Know Your Player | Onboard Verified Gamers and Scale Globally Explore More

    Blog

    Liveness Detection and IDV: An Overview of Biometric Facial Recognition

    Identity fraud and cybercrime have significantly surged in the past few years. Deepfake technolog...

    Liveness Detection and IDV: An Overview of Biometric Facial Recognition Explore More

    Blog

    AML Compliance for Money Service Businesses (MSBs) – How Shufti’s AML Screening Helps

    Money laundering has spread like a virus in today’s globalized society. Banks and other fin...

    AML Compliance for Money Service Businesses (MSBs) – How Shufti’s AML Screening Helps Explore More

    Blog

    Harnessing the power of AML Screenings to Uncover Politically Exposed Persons [PEPs]

    Since the last decade, governments and financial institutions have been trying to limit corruptio...

    Harnessing the power of AML Screenings to Uncover Politically Exposed Persons [PEPs] Explore More

    Blog, Online Marketplace

    How crucial is AML/CFT Compliance for Hong Kong based Businesses?

    Hong Kong serves as financial hub of trade and financial industry especially due to its strategic...

    How crucial is AML/CFT Compliance for Hong Kong based Businesses? Explore More

    Blog

    China’s New Data Security and Personal Information Protection Laws [2022 Update]

    For the purpose of identification, interdiction, and prevention, many governments, regulators, an...

    China’s New Data Security and Personal Information Protection Laws [2022 Update] Explore More

    Blog, Identity & KYC

    Fathoming Financial Inclusion, Innovative KYC Solutions, and Integrity

    Identity – ensures active participation of an individual in social, political and economic ...

    Fathoming Financial Inclusion, Innovative KYC Solutions, and Integrity Explore More

    Blog

    Risk Assessment – Building Trust in Financial Institutions

    For financial institutions to hold onto their customers, they must build and conserve advanced le...

    Risk Assessment – Building Trust in Financial Institutions Explore More

    Blog

    KYC Services For ICOs – Why you need to have them now?

    KYC services play a vital role in conducting an ICO in more than one way. They can make the entir...

    KYC Services For ICOs – Why you need to have them now? Explore More

    Blog

    Is NFC Really the Future? The Mystery Solved!

    We arguably live in a world that is now dependent on technology. From online payments to online e...

    Is NFC Really the Future? The Mystery Solved! Explore More

    Blog

    Improving Identity Verification Processes Through Perpetual KYC – How Shufti Helps the Banking Sector

    Banks are considered a subset of the financial services industry and play the most crucial role i...

    Improving Identity Verification Processes Through Perpetual KYC – How Shufti Helps the Banking Sector Explore More

    Blog

    Instant Client Onboarding with E-KYC Screening

    Technological Advancement and its Influence The world needs to constantly evolve in order to surv...

    Instant Client Onboarding with E-KYC Screening Explore More

    Blog

    COVID Certificate Verification – Mounting Cases of Worldwide COVID-19 Fraud

    Where the coronavirus pandemic has been all about social safety protocols and vaccine distributio...

    COVID Certificate Verification – Mounting Cases of Worldwide COVID-19 Fraud Explore More

    Blog, Financial Crime / AML

    AML Rules for Virtual Currency and Legal Sector – FATF 2019

    Financial Action Task Force (FATF) is an inter-governmental regulatory authority. It was founded ...

    AML Rules for Virtual Currency and Legal Sector  – FATF 2019 Explore More

    Blog

    How Optical Character Recognition is Changing the Financial Industry

    Banking and other financial services are the world’s most closely watched and strictly gove...

    How Optical Character Recognition is Changing the Financial Industry Explore More

    Blog

    FATF’s High-Risk Jurisdictions [2022 Update] – How Business Can Comply

    Paris-based global watchdog FATF (Financial Action Task Force) maintains lists of countries that ...

    FATF’s High-Risk Jurisdictions [2022 Update] – How Business Can Comply Explore More

    Blog

    Know Your Investor (KYI) – Identifying and Eliminating Russian Sanctions Evaders

    For quite some time, wealthy Russian businessmen and oligarchs have been investing their money in...

    Know Your Investor (KYI) – Identifying and Eliminating Russian Sanctions Evaders Explore More

    Blog

    Digital Safety for Social Media, Gaming & E-Commerce Platforms

    As people and businesses are getting more and more connected online, social media continues to pl...

    Digital Safety for Social Media, Gaming & E-Commerce Platforms Explore More

    Blog

    NFT Trading and Money Laundering – How Shufti’s AML Screening Helps Combat Financial Crimes

    With revolutionary technologies and growing digitization, the digital version of artworks known a...

    NFT Trading and Money Laundering – How Shufti’s AML Screening Helps Combat Financial Crimes Explore More

    Blog

    AML and KYC Regulations in China – New Requirements to Secure Financial Industry

    China’s financial system is undergoing a pivotal transformation. The country is limiting sharehol...

    AML and KYC Regulations in China – New Requirements to Secure Financial Industry Explore More

    Blog

    Age Verification: Use Cases, Significance and Regulations

    This pillar post talks about the significance of digital age verification, how it works, what are...

    Age Verification: Use Cases, Significance and Regulations Explore More

    Take the next steps to better security.

    Contact us

    Get in touch with our experts. We'll help you find the perfect solution for your compliance and security needs.

    Contact us

    Request demo

    Get free access to our platform and try our products today.

    Get started