Your KYC Customer Onboarding Data Template

ACTICO
Your KYC Customer Onboarding Data Template

Your KYC Customer Onboarding Data Template

This template offers a structured approach to collecting the essential data for analyzing your KYC Customer Onboarding process. It outlines the crucial attributes to gather and the key activities to track within your event log. Additionally, you will find practical guidance on extracting this data from your source systems, ensuring a smooth start to your process mining journey.
  • Recommended attributes to collect
  • Key activities to track
  • Extraction guidance for ACTICO
New to event logs? Learn how to create a process mining event log.

KYC Customer Onboarding Attributes

These are the recommended data fields to include in your event log for a comprehensive analysis of your KYC Customer Onboarding process.
5 Required 7 Recommended 6 Optional
Name Description
Activity Name
ActivityName
The name of the specific business event or task performed within the customer onboarding process.
Description

This attribute records the name of each step or activity that occurs during the KYC process, such as 'Application Submitted', 'Risk Assessment Performed', or 'Application Approved'. It provides the sequential building blocks of the process map.

Analyzing the Activity Name allows for the visualization of the process flow, identification of frequent or rare activities, and detection of bottlenecks or rework loops. It is a cornerstone for understanding what actions are being performed and in what order, which is crucial for variant analysis and compliance checks.

Why it matters

It defines the steps in the process map, allowing for visualization of the process flow, identification of deviations, and analysis of activity frequency and sequence.

Where to get

This information is typically found in an event log table within ACTICO, often in a field describing the event or task type. Consult ACTICO documentation.

Examples
Application SubmittedRisk Assessment PerformedCompliance Review CompletedApplication Rejected
Customer Application
CustomerApplication
The unique identifier for a single customer onboarding application, serving as the case ID for process analysis.
Description

The Customer Application is the primary case identifier that groups all events and activities related to a single customer's onboarding journey. It represents one complete instance of the KYC process, from the initial submission to the final decision of approval or rejection.

In process mining, this attribute is essential for reconstructing the end-to-end journey of each application. It allows analysts to track the sequence of activities, measure total cycle times, and compare different process paths, or variants, taken by various applications. All events sharing the same Customer Application ID are considered part of the same case.

Why it matters

This is the fundamental attribute for process mining, as it connects all related events into a single, cohesive process instance, enabling end-to-end analysis of each customer's onboarding experience.

Where to get

This is a primary key in the main application or case management tables within ACTICO. Consult ACTICO documentation for specific table and field names.

Examples
APP-2023-001234APP-2023-001235APP-2024-000001
Event Time
EventTime
The timestamp indicating when a specific activity started or occurred.
Description

Event Time is the precise date and time that an activity was recorded in the system. It provides the chronological order for all events within a single customer application case, forming the timeline of the onboarding journey.

This attribute is critical for all time-based analysis. It is used to calculate cycle times between activities, identify delays and waiting times, measure overall case duration, and check for compliance with Service Level Agreements (SLAs). The sequence of these timestamps for a given case allows process mining tools to reconstruct the exact process flow as it happened.

Why it matters

This attribute provides the chronological order of events, which is essential for calculating durations, discovering bottlenecks, and analyzing the process timeline.

Where to get

Located in the event log tables of ACTICO, this is the timestamp associated with each recorded activity. Consult ACTICO documentation.

Examples
2023-10-26T10:00:00Z2023-10-26T11:30:00Z2023-10-27T15:45:10Z
Last Data Update
LastDataUpdate
The timestamp indicating the last time the data was refreshed or extracted from the source system.
Description

This attribute records the date and time of the most recent data pull from ACTICO. It is a metadata field that applies to the entire dataset, rather than individual events, providing context on the freshness of the analysis.

In dashboards and reports, this information is vital for users to understand how current the data is. It helps manage expectations about the timeliness of insights and is crucial for operational monitoring where near real-time data is important. Displaying this timestamp ensures transparency and trust in the data being presented.

Why it matters

Indicates the freshness of the data, allowing users to understand if they are analyzing up-to-date information, which is critical for operational decision-making.

Where to get

This value is generated and stored during the data extraction, transformation, and loading (ETL) process. It reflects the timestamp when the ETL job was successfully completed.

Examples
2024-05-20T08:00:00Z2024-05-21T08:00:00Z
Source System
SourceSystem
The system of record from which the event data originates.
Description

This attribute identifies the source information system where the data was generated. For this process, it will consistently be 'ACTICO', but in broader analyses involving multiple systems, it helps differentiate data origins.

In a process mining context, it is crucial for data governance and validation. It ensures that data is correctly attributed to its source, which is important when merging data from different systems to create a holistic process view. It also helps in troubleshooting data quality issues by tracing them back to the originating system.

Why it matters

Provides essential context about data origin, ensuring data lineage and governance, which is critical when combining data from multiple sources.

Where to get

This is typically a static value ('ACTICO') added during the data extraction and transformation process to label the dataset.

Examples
ACTICOACTICO PlatformActico KYC Module
Application Status
ApplicationStatus
The final outcome or current state of the customer onboarding application.
Description

This attribute indicates the final disposition of a case, typically 'Approved' or 'Rejected'. It can also show the status of in-progress cases. This is a critical dimension for outcome-based analysis.

Understanding why applications are approved or rejected is a key goal of KYC process mining. This attribute allows for filtering the process map to see the typical journeys of approved versus rejected applications, helping to identify process patterns that lead to undesirable outcomes. It is also the basis for calculating the 'Application Rejection Rate' KPI.

Why it matters

Defines the outcome of each case, enabling comparative analysis between successful and unsuccessful process instances and the calculation of rejection rates.

Where to get

This is a case-level attribute, often found in the main case or application table in ACTICO. It reflects the final status of the application.

Examples
ApprovedRejectedIn ProgressPending Information
Department
Department
The business department or team responsible for performing the activity.
Description

This attribute assigns an activity to a specific organizational unit, such as 'Compliance', 'Onboarding Team', or 'Client Relations'. It provides an organizational context to the process flow.

Department-level analysis is crucial for understanding how work is handed off between different parts of the organization. It helps identify inter-departmental bottlenecks, measure departmental efficiency, and analyze resource allocation across teams. Dashboards can be filtered by department to provide managers with a view of their team's specific performance.

Why it matters

Provides an organizational dimension for analysis, allowing for the identification of cross-departmental delays and the evaluation of team-level performance.

Where to get

This information might be stored directly with the event data or derived by joining user data with an HR master data table that maps users to departments. Consult ACTICO documentation.

Examples
ComplianceOnboarding TeamCustomer Service
End Time
EndTime
The timestamp indicating when a specific activity was completed.
Description

The End Time marks the completion of an activity. Paired with the Start Time (EventTime), it allows for the calculation of the precise duration of each task, known as processing time. Not all events have a distinct end time, as some can be instantaneous.

This attribute is fundamental for performance analysis, particularly for measuring how long each step takes. It enables the creation of detailed performance dashboards, helps identify which activities consume the most time, and is essential for calculating KPIs like 'Average Document Review Time'.

Why it matters

Enables the calculation of precise activity durations (processing time), which is crucial for identifying performance bottlenecks and analyzing resource efficiency.

Where to get

Like the start time, this is typically found in the event log tables of ACTICO. Some systems store start and end times in separate columns for a single event record. Consult ACTICO documentation.

Examples
2023-10-26T10:15:00Z2023-10-26T12:00:00Z2023-10-27T16:00:15Z
Initiating User
InitiatingUser
The user ID or name of the employee who performed the activity.
Description

This attribute identifies the specific user or system agent responsible for executing an activity. It links process steps to the individuals or teams who performed them.

Analyzing performance by user is a common requirement. This attribute allows for the creation of dashboards that show workload distribution, individual processing times, and performance comparisons between users or teams. It helps identify high-performing individuals as well as those who may require additional training, and it is key for understanding resource allocation and utilization.

Why it matters

Links process activities to specific users, enabling performance analysis by individual or team and helping to identify training needs or resource imbalances.

Where to get

Typically stored alongside each event in ACTICO's event log or transaction history tables. Consult ACTICO documentation.

Examples
john.doejane.smithSYSTEM_USER
Rejection Reason
RejectionReason
The specific reason provided when a customer application is rejected.
Description

When an application's final status is 'Rejected', this attribute provides the underlying cause. Examples include 'Incomplete Documentation', 'Failed Background Check', or 'High Risk Profile'.

This is a vital attribute for root cause analysis. By analyzing the frequency of different rejection reasons, the business can identify systemic issues in the process or with customer submissions. For example, a high number of rejections due to incomplete documentation might indicate that the application instructions are unclear. This directly supports the 'Application Rejection Rate and Reasons' dashboard.

Why it matters

Provides the 'why' behind application rejections, enabling root cause analysis to reduce the rejection rate and improve process efficiency.

Where to get

Usually found in the main case or application table in ACTICO, often populated only when the Application Status is 'Rejected'.

Examples
Incomplete DocumentationFailed Identity VerificationSanctions MatchHigh Risk Score
Risk Level
RiskLevel
The calculated risk level of the customer application, such as Low, Medium, or High.
Description

This attribute represents the assessed risk category of a customer, which often determines the complexity and rigor of the subsequent KYC process. A high-risk customer may require additional checks and approvals compared to a low-risk one.

In process mining, Risk Level is a powerful dimension for comparative analysis. It allows analysts to check if the process correctly follows different paths based on risk, as intended. For example, one can verify that all high-risk customers undergo an enhanced due diligence step. It is key for the 'Risk Assessment Process Flows' dashboard.

Why it matters

Allows for segmentation of cases based on risk, enabling analysis of whether the process correctly adapts to different risk profiles as required by compliance policies.

Where to get

This is a key data point stored at the case level in the main application table within ACTICO.

Examples
LowMediumHigh
SLA Target Date
SlaTargetDate
The date by which the customer onboarding process is expected to be completed.
Description

The SLA Target Date is the deadline for completing the onboarding of a customer, as defined by internal service level agreements. This date is often calculated based on the application submission date plus a standard processing time.

This attribute is essential for monitoring SLA compliance. By comparing the actual completion date of a case to its SLA Target Date, the system can determine if the case was completed on time or breached the SLA. This is the basis for the 'Onboarding SLA Performance' dashboard and the 'Onboarding SLA Adherence Rate' KPI.

Why it matters

Provides the benchmark for measuring on-time performance, enabling direct monitoring and reporting of SLA compliance.

Where to get

This may be stored as a field in the main case table in ACTICO or could be derived based on business rules (e.g., Submission Date + 5 business days).

Examples
2023-11-01T17:00:00Z2023-11-02T17:00:00Z2023-11-03T17:00:00Z
Country
Country
The country of residence of the customer applying for onboarding.
Description

This attribute specifies the customer's country, which can have a significant impact on the KYC process. Different jurisdictions have different regulatory requirements, which may trigger additional or alternative process steps.

Analyzing the process by country allows for a comparison of performance across different regions. It can help identify if certain countries consistently experience longer cycle times or higher rejection rates, potentially indicating regulatory friction or specific market challenges. This geographical view is important for global organizations aiming to standardize processes while respecting local compliance needs.

Why it matters

Provides a geographical dimension for analysis, helping to understand process variations and performance differences across various regulatory jurisdictions.

Where to get

This is a core piece of customer information stored at the case or customer level within the ACTICO system.

Examples
USADEUGBRSGP
Customer Type
CustomerType
Categorization of the customer, such as Individual or Corporate.
Description

This attribute classifies the applicant into different categories, for example, an individual person versus a corporate entity. The KYC process often differs significantly between these types, with corporate onboarding being much more complex.

Using Customer Type as a dimension allows for a clear separation and comparison of these distinct processes within the same dataset. Analysts can filter the process map to view only 'Corporate' customers to understand their unique challenges, bottlenecks, and cycle times, without the data being skewed by the much simpler 'Individual' customer process.

Why it matters

Enables segmentation of the process for different customer categories, which often have vastly different process flows and complexities, leading to more accurate analysis.

Where to get

This is a fundamental attribute stored at the case or customer level within ACTICO.

Examples
IndividualCorporateSmall Business
Is Automated
IsAutomated
A flag indicating whether an activity was performed automatically by the system or manually by a user.
Description

This boolean attribute distinguishes between tasks executed by a human user and those performed by system automation, such as an automated background check or risk scoring.

Analyzing this attribute helps in evaluating the effectiveness of automation initiatives. It allows for a comparison of processing times between automated and manual steps, identifies which parts of the process are still heavily manual, and can highlight opportunities for further automation to improve efficiency and reduce operational costs.

Why it matters

Distinguishes between human and system tasks, which is crucial for measuring the impact of automation and identifying opportunities for future efficiency gains.

Where to get

This can be inferred from the 'InitiatingUser' attribute (e.g., if the user is 'SYSTEM') or it might be a dedicated flag in the event log. Consult ACTICO documentation.

Examples
truefalse
Is Rework
IsRework
A calculated flag that identifies if an activity is a repeated step or part of a rework loop.
Description

This boolean attribute flags activities that are being performed for a second or subsequent time within the same case, such as a 'Document Review' that happens after a request for more information. It identifies instances of rework, which are typically a source of process inefficiency.

Identifying rework is a primary goal of process mining. This flag allows for the quantification of rework, such as calculating the 'Document Rework Rate' KPI. In the process map, rework loops can be highlighted to show where the process is cycling back on itself. This helps pinpoint quality issues or areas where the process is not 'right first time'.

Why it matters

Highlights instances of repeated work, allowing for the direct measurement of process inefficiency and the identification of activities with quality or clarity issues.

Where to get

This is a calculated attribute. The logic is defined within the process mining tool or during data transformation to detect repeated activities within the same case.

Examples
truefalse
Processing Time
ProcessingTime
The duration of time spent actively working on an activity.
Description

Processing Time is the calculated duration from an activity's start time to its end time. This metric represents the 'touch time' or the active work time, as opposed to waiting time between activities.

This is a critical KPI for measuring operational efficiency. High processing times for certain activities are clear indicators of bottlenecks or overly complex tasks. By aggregating this metric, managers can identify which steps consume the most resources and prioritize them for process improvement or automation initiatives. It is a fundamental component of performance dashboards.

Why it matters

Measures the active work duration of a task, helping to pinpoint inefficient activities that are consuming the most time and resources.

Where to get

This is a calculated metric, derived by subtracting the 'EventTime' (StartTime) from the 'EndTime' for each activity.

Examples
864000003600000600000
SLA State
SlaState
A calculated status indicating if the case met, breached, or is at risk of breaching its SLA.
Description

This attribute provides a categorical assessment of a case's performance against its Service Level Agreement. It is derived by comparing the case's completion time (or current time for open cases) against the 'SlaTargetDate'.

This attribute simplifies SLA reporting by converting date comparisons into an easy-to-understand status. Dashboards can use this for clear visualizations like pie charts or gauges showing the percentage of cases that are 'Met' versus 'Breached'. It is a key element for the 'Onboarding SLA Performance' dashboard and directly supports the 'Onboarding SLA Adherence Rate' KPI.

Why it matters

Provides a clear, categorical status of SLA compliance for each case, simplifying reporting and allowing for easy visualization of performance against targets.

Where to get

This is a calculated attribute derived from business logic that compares the case completion timestamp with the 'SlaTargetDate'.

Examples
MetBreachedAt Risk
Required Recommended Optional

KYC Customer Onboarding Activities

These are the key process steps and milestones to capture in your event log for accurate discovery and analysis of your KYC Customer Onboarding.
8 Recommended 6 Optional
Activity Description
Application Approved
This activity represents the final business decision to approve the customer's application for onboarding. It is a key milestone, typically captured as a distinct and final status change in the application's lifecycle.
Why it matters

This milestone is a precursor to account creation and signifies a successful outcome. Analyzing the time to reach this point is crucial for understanding the 'happy path' duration.

Where to get

Inferred from the final status field in the main application or case table. Look for a status like 'Approved', 'Approval Complete', or a similar terminal positive state.

Capture

The final status of the case is updated to 'Approved' in the case master data.

Event type inferred
Application Rejected
Represents the final decision to reject the customer's application, terminating the onboarding process. This is a critical end state, captured via a final status change on the application record.
Why it matters

This is the primary failure end event. Analyzing cases that end with this activity is crucial for understanding rejection rates, reasons for failure, and improving overall process yield.

Where to get

Inferred from the final status field in the main application or case table. Look for a terminal status such as 'Rejected', 'Declined', or 'Closed - Rejected'.

Capture

The final status of the case is updated to 'Rejected' in the case master data.

Event type inferred
Application Submitted
This activity marks the start of the KYC onboarding process when a new customer application is formally received by the ACTICO system. It is captured as an explicit event, typically logged with a precise timestamp upon the creation of a new case or application record.
Why it matters

As the primary start event, this activity is essential for calculating the overall onboarding cycle time and tracking application volume. It serves as the baseline timestamp for all subsequent process performance measurements.

Where to get

This is typically an explicit entry in an application or case creation log within ACTICO. Look for tables related to application submission events or the creation timestamp of the primary case record.

Capture

Event logged upon creation of a new application case instance.

Event type explicit
Compliance Review Completed
Marks the end of the manual review by the compliance department, with a decision to approve, reject, or request further action. This activity is inferred from a case status change from 'Pending Compliance Review' to a subsequent state like 'Compliance Approved'.
Why it matters

This is the closing event for the compliance review stage. It is essential for calculating the total compliance review duration and analyzing the team's throughput.

Where to get

Inferred from the application's status history log. Look for the timestamp when the case moves out of a 'In Compliance Review' state, indicating a decision has been made.

Capture

Inferred from case status changing from 'Pending Compliance' to 'Compliance Approved' or similar.

Event type inferred
Compliance Review Initiated
Marks the beginning of the manual review phase by the compliance department, often for high-risk or flagged applications. This is typically inferred from a change in case status to 'Pending Compliance Review' or the assignment of the case to a compliance officer's work queue.
Why it matters

This activity is the starting point for measuring the compliance bottleneck. The time elapsed until 'Compliance Review Completed' is a critical KPI for identifying delays in this crucial stage.

Where to get

Inferred from the application's status history or audit trail. Look for a timestamp associated with a status change to 'In Compliance Review' or assignment to a compliance-related user group.

Capture

Inferred from case status changing to 'Pending Compliance' or assignment to the compliance team.

Event type inferred
Customer Documents Uploaded
This activity occurs when the customer provides the required identification and supporting documents through a portal or other channel integrated with ACTICO. Each document upload is usually captured as a distinct, explicit event in the system's document management or case log.
Why it matters

This marks a key customer-dependent milestone. Tracking this event is crucial for measuring customer response times and analyzing the duration of the subsequent document review phase.

Where to get

Look for event logs related to document handling or attachments to the application case. These are often recorded in dedicated document or evidence management tables within the ACTICO database.

Capture

Event logged by the system when a document is attached to the case.

Event type explicit
Customer Onboarding Completed
This is the final activity in the process, signifying that the customer is fully onboarded and the application case is closed. This is inferred from a final, terminal status like 'Onboarded' or 'Closed - Approved' being applied to the case.
Why it matters

As the primary success end event, this activity is essential for calculating the end-to-end cycle time for all successfully onboarded customers. It provides the final timestamp for happy path analysis.

Where to get

Inferred from the final status field of the customer application case. Look for a timestamp associated with the case moving to a terminal success status.

Capture

Inferred from a final case status update to 'Completed' or 'Closed'.

Event type inferred
Risk Assessment Performed
This activity represents the execution of ACTICO's decisioning engine to calculate a risk score or rating for the customer application. As a core function of the system, this is captured as an explicit event when the risk assessment rule set is executed.
Why it matters

The risk assessment is a pivotal decision point that often dictates the subsequent process path. Analyzing this activity helps understand how risk levels influence process variants and timelines.

Where to get

This is a core event within ACTICO and should be recorded in the decision or execution logs. These logs typically contain the case ID, the rules executed, and the resulting risk score.

Capture

Event logged by the ACTICO decision engine upon completion of the risk scoring.

Event type explicit
Account Created
Following approval, this activity marks the technical creation of the customer's account in the core banking or user management system. This is often an explicit event logged by ACTICO after receiving a success confirmation from the downstream system.
Why it matters

This activity confirms that the process resulted in a tangible business outcome. The time from 'Application Approved' to 'Account Created' can reveal integration delays or inefficiencies in the final provisioning steps.

Where to get

This information would likely be found in integration or system interface logs within ACTICO, which record the outcome of calls to external systems for account provisioning.

Capture

Event logged upon receiving a successful API response from the core account system.

Event type explicit
Additional Information Requested
Represents an event where a reviewer, often in compliance or underwriting, requires more information or documentation from the customer. This action is usually captured explicitly as it often involves sending a notification to the customer and pausing the case.
Why it matters

This activity is a primary driver of rework and increased cycle times. Tracking its frequency and impact is essential for identifying areas where initial data collection can be improved.

Where to get

This is likely an explicit event recorded in the case history or communication log. Look for events like 'RFI Sent' (Request for Information) or a specific status change like 'Pending Customer Information'.

Capture

An explicit user-triggered event such as 'Send RFI' is logged in the case audit trail.

Event type explicit
Background Checks Initiated
This represents the point where automated or manual background checks, such as AML or credit history screenings, are started. This is often logged as an explicit event when the system triggers these checks, which may involve external service providers.
Why it matters

Initiating background checks is a significant milestone in the due diligence process. Tracking this helps in understanding the dependencies and lead times associated with external data providers.

Where to get

Look for records in system logs or an audit trail that indicates the triggering of background screening procedures. These are often linked to the main application case ID.

Capture

Event logged when the workflow engine initiates calls to background check services.

Event type explicit
Document Review Completed
This activity signifies that an agent has finished reviewing the documents submitted by the customer. It is typically inferred from a status change on the document or the overall case, such as 'Documents Verified' or 'Review Complete'.
Why it matters

This is a key milestone for measuring the efficiency of the document handling process. The time between 'Customer Documents Uploaded' and this activity is a critical KPI for identifying manual processing delays.

Where to get

Inferred from status history logs for the application case or for individual documents. A change in a document's status from 'Pending Review' to 'Approved' or 'Reviewed' indicates this activity.

Capture

Inferred from a change in document status to 'Verified' or 'Reviewed'.

Event type inferred
Identity Verification Performed
Represents an automated or manual check to validate the customer's identity against external or internal data sources. This is often recorded as an explicit event when an API call to a third-party verification service is made and a response is received.
Why it matters

This activity is a critical compliance step. Analyzing its duration and outcomes helps identify dependencies on external services and potential bottlenecks in the verification process.

Where to get

This information is typically found in integration logs or specific event tables that record the results of automated checks and third-party service calls linked to the application case.

Capture

Event logged from an integration call to a third-party identity verification service.

Event type explicit
Initial Application Review
Represents the first review of the submitted application, either by an automated rule or a human agent, to check for completeness and basic eligibility. This activity is often inferred from a status change on the application, for example, from 'Submitted' to 'In Review'.
Why it matters

Analyzing the time to complete this first review helps identify initial processing delays. It also provides insights into how many applications pass this first gate without issues.

Where to get

Inferred from status history tables or audit logs associated with the customer application case. Compare the timestamp when the status changes from a 'new' or 'submitted' state to a 'review' state.

Capture

Detect status change from 'Submitted' to 'Under Review' in the case history log.

Event type inferred
Recommended Optional

Extraction Guides

How to get your data from ACTICO