Your KYC Customer Onboarding Data Template

Universal process mining template
Your KYC Customer Onboarding Data Template

Your KYC Customer Onboarding Data Template

Universal process mining template

This is our generic process mining data template for KYC Customer Onboarding. Use our system-specific templates for more specific guidance.

Select a specific system
  • A comprehensive, yet flexible, starting point for any KYC onboarding system.
  • Identifies crucial data points for effective process discovery and analysis.
  • Serves as a universal framework before diving into system-specific details.
New to event logs? Learn how to create a process mining event log.

KYC Customer Onboarding Attributes

These recommended data fields provide crucial contextual information, enabling a comprehensive process analysis of your KYC customer applications.
5 Required 6 Recommended 6 Optional
Name Description
Activity Name
ActivityName
The name of the specific business event or task performed within the customer onboarding process.
Description

The Activity Name describes a distinct step or milestone in the customer onboarding journey, such as 'Application Submitted', 'Compliance Review Initiated', or 'Application Approved'. Each activity represents a specific action taken by a user or a system that moves the application forward in the process.

This attribute is fundamental for visualizing the process map, which forms the core of process mining. By analyzing the sequence and frequency of different activities, analysts can understand the actual process flow, identify common pathways, discover process deviations, and pinpoint areas of rework or repetition. The clarity and consistency of activity names are crucial for building a meaningful and understandable process model.

Why it matters

It defines the steps of the process, allowing for the visualization and analysis of the process flow, bottlenecks, and variations.

Where to get

Found in event logs, audit trails, or transaction tables that record business process steps.

Examples
Initial Screening PerformedDocuments RequestedRisk Assessment PerformedApplication Approved
Application ID
CustomerApplicationId
The unique identifier for a customer onboarding application, serving as the case ID for process analysis.
Description

The Customer Application ID is a unique key assigned to each new customer onboarding request from the moment it is initiated until it is completed or terminated. This identifier acts as the central thread that connects all individual activities, events, and data points related to a single onboarding journey, making it the most critical attribute for process mining.

In analysis, this ID allows the reconstruction of the end-to-end process for each customer. It enables tracking of the application's progress, calculation of its total cycle time, and comparison of its path against others. All process variants, bottlenecks, and performance metrics are analyzed on a per-application basis, which is only possible by correctly identifying and using this attribute as the case ID.

Why it matters

It is essential for grouping all related events into a single end-to-end process, forming the basis of all process mining analysis.

Where to get

Typically found in the header or primary table of the customer application or case management system.

Examples
APP-2023-00123KYC-987654ONB-C-456-7890
Event Start Time
EventStartTime
The timestamp indicating when a specific activity started or occurred.
Description

The Event Start Time is the precise date and time that marks the beginning of an activity. It is one of the three essential pillars of process mining, alongside the Case ID and Activity Name. This timestamped data allows for the chronological ordering of events within each case, which is necessary to reconstruct the process flow as it happened in reality.

This attribute is the basis for all time-related analysis. It is used to calculate the duration of activities (when an end time is available), the waiting time between activities (handoff time), and the total cycle time of the entire onboarding process. Analyzing these durations helps identify bottlenecks, measure SLA adherence, and monitor overall process performance.

Why it matters

It provides the chronological order of events, which is essential for discovering the process model and calculating all time-based performance metrics.

Where to get

Located in event logs, application audit trails, or transaction tables, often labeled as 'Timestamp', 'Creation Date', or 'Start Time'.

Examples
2023-01-15T09:00:00Z2023-03-20T14:35:10Z2023-05-10T11:21:05Z
Last Data Update
LastDataUpdate
The timestamp indicating the last time the data was refreshed or extracted from the source system.
Description

This attribute records the date and time of the most recent data extraction or refresh. It is not part of the business process itself but is crucial metadata for data validation and governance. It provides transparency about the freshness of the data being analyzed.

In process analysis, knowing the last data update time is essential for understanding the timeliness of the insights generated. It helps users trust the data by confirming how current it is and prevents misinterpretations based on outdated information. For ongoing monitoring, this attribute can be used to set up alerts if data refreshes are delayed or fail, ensuring the continuous reliability of the process mining dashboards.

Why it matters

It ensures data transparency by indicating the freshness of the dataset, which is critical for the relevance and accuracy of the analysis.

Where to get

Generated during the data extraction, transformation, and loading (ETL) process; often found in the metadata of the dataset.

Examples
2023-10-27T02:00:00Z2023-10-26T02:00:00Z2023-10-25T02:00:00Z
Source System
SourceSystem
Identifies the system of record from which the event data originates.
Description

The Source System attribute specifies the application or platform that generated the data for a given activity. In complex environments, the KYC process may span multiple systems, such as a CRM for application submission, a dedicated KYC platform for risk assessment, and a core banking system for account creation.

Analyzing the process by source system helps understand the technological landscape and its impact on the process. It can highlight integration issues, data delays between systems, or discrepancies in how different systems record information. This view is valuable for IT and process improvement teams looking to streamline the system architecture supporting the onboarding journey.

Why it matters

It provides context about where each process step occurs, helping to identify cross-system inefficiencies and data integration challenges.

Where to get

Often included in data extracts or event logs, especially in environments with multiple integrated systems.

Examples
CRM_System_AKYC_Platform_BCoreBanking_Sys_C
Application Status
ApplicationStatus
The final outcome or current state of the customer onboarding application.
Description

The Application Status indicates the ultimate disposition of an application, such as 'Approved', 'Rejected', or 'Withdrawn'. It represents the business outcome of the process and is a critical dimension for performance measurement.

This attribute is essential for outcome-based analysis. It allows for the comparison of process paths that lead to successful outcomes versus those that result in rejections. Analysts can use this to identify process patterns associated with high rejection rates, calculate KPIs like the 'Application Rejection Rate', and build an 'Onboarding Funnel Analysis' to see where applicants drop off. Understanding why applications fail is the first step toward improving the process to increase the success rate.

Why it matters

It defines the business outcome of each case, enabling analysis of why applications are rejected and how to improve the approval rate.

Where to get

Typically found in the main case or application table, indicating the final state of the record.

Examples
ApprovedRejectedIn ProgressWithdrawn by Customer
Customer Type
CustomerType
Categorization of the customer, such as Individual or Corporate.
Description

The Customer Type classifies the applicant into distinct categories, for example, 'Individual', 'Corporate', 'Trust', or 'Non-Profit'. Different customer types often have vastly different onboarding requirements and process complexities.

This is a key segmentation attribute for analysis. By filtering the process map and KPIs by Customer Type, organizations can uncover significant variations. For example, onboarding a corporate client typically involves more complex steps like verifying beneficial ownership, which is not required for an individual. This analysis ensures that each process variant is as efficient as possible for its specific segment and helps in tailoring process improvements.

Why it matters

It allows for the segmentation of the process to compare and optimize the onboarding journey for different types of customers.

Where to get

Usually captured at the beginning of the application process and stored in the main customer or application table.

Examples
IndividualCorporateTrustSmall Business
Event End Time
EventEndTime
The timestamp indicating when a specific activity was completed.
Description

The Event End Time marks the precise date and time an activity concluded. When paired with the Event Start Time, it allows for the exact calculation of processing time for each individual task. Not all systems provide both start and end times; some may only offer a single timestamp representing completion.

Having an end time is highly valuable for performance analysis. It enables the creation of detailed metrics such as 'Average Compliance Review Time' by distinguishing between the time an employee actively worked on a task (processing time) and the time the task was waiting in a queue (wait time). This level of detail is crucial for accurately identifying bottlenecks and focusing improvement efforts on either resource capacity or process handoffs.

Why it matters

It enables the precise calculation of activity processing times, which helps differentiate between active work time and idle wait time.

Where to get

Found in event logs or transaction tables alongside the start time. May be labeled 'End Time', 'Completion Date', or 'Modified On'.

Examples
2023-01-15T17:30:00Z2023-03-21T10:15:20Z2023-05-10T11:55:00Z
Risk Level
RiskLevel
The calculated risk classification of the customer application, such as Low, Medium, or High.
Description

The Risk Level is a critical output of the KYC process, categorizing customers based on factors like their industry, geography, and transaction patterns. This classification determines the level of scrutiny and due diligence required for their application.

In process mining, this attribute is a powerful dimension for conformance and variant analysis. The process for a high-risk customer should, by design, be different and more rigorous than for a low-risk one. By comparing the actual process flows for different risk levels against the expected procedures, organizations can check for compliance with internal policies and regulations. It helps answer questions like, 'Are high-risk customers always undergoing enhanced due diligence?' or 'Are we spending too much time on low-risk customers?'.

Why it matters

It is essential for compliance and risk management, allowing analysis of whether due diligence processes vary appropriately for different risk profiles.

Where to get

Calculated by a risk engine or manually assigned by a compliance officer. Stored in the main customer or application record.

Examples
LowMediumHighPEP
User Department
UserDepartment
The business department or team responsible for performing the activity.
Description

The User Department specifies the functional group or team to which the user who performed the activity belongs, such as 'Compliance', 'Client Onboarding', or 'Operations'. This provides a higher-level organizational context compared to the individual User ID.

Analyzing the process from a departmental view is critical for understanding cross-functional collaboration and identifying systemic bottlenecks. It helps visualize the handoffs between different teams, which are often a major source of delays and inefficiencies. This information is key for optimizing team structures, clarifying responsibilities, and improving communication channels to create a smoother onboarding experience.

Why it matters

It enables analysis of process performance and handoffs between different teams, highlighting opportunities for improving cross-functional collaboration.

Where to get

Often available in user profile data linked to the User ID, or it may be recorded directly on the transaction.

Examples
ComplianceFront OfficeKYC Operations
User ID
UserId
The user ID or name of the employee or automated agent who performed the activity.
Description

The User ID identifies the person or system bot responsible for executing a specific activity in the process. This could be a compliance officer, a data entry clerk, or an automated risk scoring engine. Consistency in user identification is key for accurate resource analysis.

This attribute provides a human-centric view of the process. It is essential for analyzing workload distribution, individual and team performance, and resource allocation. By filtering the process map by User ID, managers can understand how different employees handle tasks, identify training opportunities, and ensure work is balanced. It also helps in collaboration analysis, revealing how work is handed off between different people.

Why it matters

It allows for analysis of workload, resource performance, and collaboration patterns, enabling better resource management and training.

Where to get

Available in system audit trails or transaction logs, often linked to the user who created or last modified a record.

Examples
john.doeSYSTEM_AUTOuser12345
Application Channel
ApplicationChannel
The channel through which the customer application was submitted.
Description

This attribute identifies the method used by the customer to submit their application, such as 'Web Portal', 'Mobile App', or 'In-Branch'. Different channels may have different data capture processes and customer experiences.

Analyzing the process by channel helps evaluate the performance and efficiency of each customer touchpoint. It can answer questions like, 'Do mobile applications get processed faster than web applications?' or 'Is the rework rate higher for applications submitted in-branch?'. These insights are valuable for optimizing the customer journey across all channels and allocating resources effectively.

Why it matters

It enables comparison of process efficiency and customer experience across different submission channels, such as web, mobile, or in-person.

Where to get

Typically recorded at the very beginning of the process when the application is first created.

Examples
Web PortalMobile AppIn-Branch
Customer Country
CustomerCountry
The country of residence or incorporation for the customer.
Description

The Customer Country specifies the geographic location of the applicant. This is a vital piece of information in KYC processes, as regulations and risk factors can vary significantly from one country to another.

Geographic analysis provides another important layer of insight. Onboarding processes may differ based on country-specific legal requirements. By filtering by Customer Country, companies can verify that these jurisdictional variants are being followed correctly. It can also reveal performance differences, such as longer cycle times for applications from high-risk countries, which may be expected due to enhanced due diligence requirements.

Why it matters

It allows for analysis of process variations and performance based on geography, which is critical for ensuring compliance with local regulations.

Where to get

Captured from the customer during the application process and stored on the customer or application record.

Examples
USAGBRSGPDEU
Customer ID
CustomerId
The unique identifier for the customer entity being onboarded.
Description

The Customer ID is a unique identifier for the customer that persists across multiple interactions or applications. While the Customer Application ID tracks a single onboarding journey, the Customer ID can link multiple onboarding attempts or other processes for the same customer.

This attribute provides a customer-centric analysis that extends beyond a single case. It is useful for understanding repeat applicants, analyzing the long-term relationship of a customer, or connecting the onboarding process to other processes like 'Loan Application' or 'Account Maintenance'. While not essential for a single-process view, it enriches the data for more complex, object-centric process mining.

Why it matters

It allows for a customer-centric view, linking multiple onboarding attempts or different processes related to the same customer.

Where to get

Usually found in a central customer master data system and linked to the application record.

Examples
CUST-1005678943210AENT-4590
Is Automated
IsAutomated
A flag indicating whether an activity was performed automatically by the system or manually by a user.
Description

This boolean attribute distinguishes between tasks executed by software or bots and those performed by human users. Automated activities might include initial data validation, sanctions screening, or sending standardized communications.

Analyzing this attribute is crucial for evaluating the effectiveness of automation initiatives. By comparing the speed and outcomes of automated steps versus manual ones, businesses can identify opportunities for further automation to reduce costs and cycle times. It also helps in monitoring the performance of automated systems and ensuring they are functioning as expected within the end-to-end process.

Why it matters

It helps measure the impact and efficiency of automation in the process, identifying opportunities for further robotic or systematic improvements.

Where to get

Can be a dedicated field in the event log or derived based on the User ID, for instance, if the ID is 'SYSTEM' or 'BOT'.

Examples
truefalse
Rejection Reason
RejectionReason
The specific reason provided when a customer application is rejected.
Description

When an application's status is 'Rejected', the Rejection Reason provides the specific cause, such as 'Incomplete Documentation', 'High Risk Profile', or 'Sanctions Match'. This attribute adds crucial context to failed processes.

Analyzing rejection reasons is fundamental to the 'Application Rejection Analysis' dashboard. It helps businesses perform root cause analysis to understand the most common failure points in the onboarding process. By categorizing and quantifying these reasons, organizations can prioritize improvements. For example, if 'Incomplete Documentation' is a top reason, the company might focus on clarifying instructions for customers or improving the document submission portal.

Why it matters

It provides the root cause for failed applications, enabling targeted improvements to reduce the rejection rate and improve customer experience.

Where to get

Usually stored in the main application or case table, often populated when the status is set to 'Rejected'.

Examples
Failed Identity VerificationIncomplete DocumentationHigh RiskPEP Match
SLA Target Date
SlaTargetDate
The date by which the customer onboarding process is expected to be completed.
Description

The Service Level Agreement (SLA) Target Date is the deadline set for completing the customer onboarding process. This date is often determined by internal policies or contractual obligations and serves as a benchmark for measuring timeliness.

This attribute is the foundation for the 'SLA Performance Monitoring' dashboard. By comparing the actual completion date of an application with its SLA Target Date, the 'SLA Adherence Rate' can be calculated. Analyzing cases that missed their SLA helps identify the specific activities or departments causing delays. This allows for proactive management of work queues and resource allocation to minimize SLA breaches and improve customer satisfaction.

Why it matters

It provides a performance benchmark, enabling the measurement of SLA adherence and the identification of cases at risk of delay.

Where to get

Often calculated and stored on the main application record when the case is created, based on application type or other criteria.

Examples
2023-01-30T23:59:59Z2023-04-15T23:59:59Z2023-06-01T23:59:59Z
Required Recommended Optional

KYC Customer Onboarding Activities

This table outlines the key process steps and milestones essential for capturing an accurate, detailed event log of your KYC customer onboarding journey.
7 Recommended 8 Optional
Activity Description
Additional Information Requested
Represents an event where a reviewer requires more information or documentation from the customer to proceed. This action creates a rework loop and pauses the internal process.
Why it matters

This is a primary driver of process inefficiency and prolonged cycle times. High frequency of this activity indicates issues with initial data collection.

Where to get

Usually captured explicitly as it often involves sending a notification to the customer and is logged in communication or audit trails.

Capture

Use the timestamp of a 'Request for Information' event, a specific status change, or a logged communication to the customer.

Event type explicit
Application Approved
This activity represents the final business decision to approve the customer's application for onboarding. It is a key milestone indicating a successful outcome of the KYC process.
Why it matters

This is a critical success event and a terminal point for the decision-making process. It allows for analysis of approval rates and time-to-approve.

Where to get

This is typically captured as a distinct and final status change in the application's lifecycle, recorded in the case management system.

Capture

Identify the timestamp when the application's final status is set to 'Approved' or a similar terminal success state.

Event type inferred
Application Rejected
Represents the final decision to reject the customer's application, terminating the onboarding process. This is a critical negative outcome of the process.
Why it matters

This is a key failure event. Analyzing when and why rejections occur is essential for process improvement and understanding customer friction.

Where to get

This is captured via a final, terminal status change on the application record, such as 'Rejected' or 'Declined'.

Capture

Identify the timestamp when the application's final status is set to 'Rejected' or a similar terminal failure state.

Event type inferred
Application Submitted
This activity marks the start of the customer onboarding process. It is captured when a new customer application is formally received by the system, either through a customer-facing portal or internal data entry.
Why it matters

This is the primary start event for the process. Analyzing the volume and timing of submissions is fundamental to understanding demand and capacity.

Where to get

This event is typically captured from an application creation log or the first entry in a case management system's audit trail.

Capture

Use the creation timestamp of the application or case record.

Event type explicit
Compliance Review Initiated
This activity marks the start of the manual review phase by the compliance department. It typically occurs for high-risk or flagged applications and represents a critical handoff to a specialized team.
Why it matters

Tracking this activity is crucial for identifying bottlenecks in the compliance process. The time until completion is a key component of the overall cycle time.

Where to get

This event is often inferred from a change in case status or from an audit log showing the case was assigned to a compliance officer's work queue.

Capture

Identify the timestamp when the application's status changes to 'Pending Compliance' or when it is assigned to a compliance work queue.

Event type inferred
Onboarding Completed
This is the final activity in the process, signifying that the customer is fully onboarded and the application case is administratively closed. The customer is now ready to transact.
Why it matters

This is the ultimate end event for successful cases. The total time to reach this activity represents the full customer onboarding journey time.

Where to get

Inferred from a final, terminal status like 'Onboarded' or 'Closed - Approved' being applied to the case in the source system.

Capture

Use the timestamp of the final case closing event or when the status is updated to a terminal 'Completed' state.

Event type inferred
Risk Assessment Performed
This activity represents the execution of a decisioning engine or a manual process to calculate a risk score for the customer application. It consolidates information to classify the customer's risk level.
Why it matters

The outcome of the risk assessment often determines the subsequent process path, such as straight-through processing versus manual compliance review.

Where to get

As a core function, this is often captured as an explicit event when the risk assessment rule set is executed or a risk score field is populated.

Capture

Use the timestamp from the log of the risk engine execution or the audit trail for the risk score field.

Event type explicit
Account Created
Following approval, this activity marks the technical creation of the customer's account in the core banking or user management system. This moves the customer from applicant to active.
Why it matters

This measures the efficiency of the handoff between the decision-making process and the technical provisioning systems.

Where to get

Often an explicit event logged by the onboarding system after receiving a success confirmation from a downstream system, or from the creation date in the core system.

Capture

Use the account creation timestamp from the core system, or the confirmation event logged in the onboarding system.

Event type explicit
Background Check Initiated
This represents the point where automated or manual background checks, such as AML, PEP, or credit history screenings, are started. This often involves triggering external service providers.
Why it matters

The duration of background checks can be a major source of delay. Tracking the initiation helps measure the time spent waiting for third-party results.

Where to get

This is often logged as an explicit event when the system triggers these checks or inferred from a status change like 'Pending Background Check'.

Capture

Use the timestamp from the API call to the background check service or the log entry indicating the check was started.

Event type explicit
Compliance Review Completed
Marks the end of the manual review by the compliance department. The compliance officer has made a decision to approve, reject, or request further action on the application.
Why it matters

This milestone concludes a critical and often lengthy stage. Analyzing the time leading up to this point helps measure compliance team efficiency.

Where to get

This activity is typically inferred from a case status change from 'Pending Compliance' to a subsequent state like 'Compliance Approved'.

Capture

Use the timestamp when a compliance review task is marked 'Complete' or when the case status is updated to reflect the review's outcome.

Event type inferred
Document Review Completed
This activity signifies that an agent or an automated tool has finished reviewing the documents submitted by the customer. The documents have been checked for authenticity, validity, and completeness.
Why it matters

The duration of document review is often a significant part of the total processing time. Analyzing this step helps identify resource or training needs.

Where to get

This is often inferred from a status change on the document or the overall case, such as 'Documents Verified' or 'Review Complete'.

Capture

Identify the timestamp when a manual review task is marked as complete or when the case status updates to reflect successful document verification.

Event type inferred
Documents Received
This activity marks the point when the customer has provided the required identification and supporting documents. The documents are now available in the system for review.
Why it matters

This event is critical for measuring customer response times and identifying delays caused by the applicant.

Where to get

Typically captured as distinct, explicit events in the system's document management log or case audit trail upon each document upload.

Capture

Use the timestamp associated with the creation or upload of document attachments linked to the application case.

Event type explicit
Documents Requested
This activity occurs when the system or an agent determines that specific documents are required from the customer to proceed with verification. It represents a formal request for information being sent to the applicant.
Why it matters

Tracking this helps understand process-driven delays. The time between this event and 'Documents Received' is customer waiting time.

Where to get

This can be captured from system-generated communication logs, email records, or a status change indicating the case is 'Awaiting Documents'.

Capture

Use the timestamp of the communication sent to the customer or the status change to a 'Pending Documents' state.

Event type explicit
Identity Verification Performed
Represents an automated or manual check to validate the customer's identity against external or internal data sources. This is a core verification step in the KYC process.
Why it matters

This activity is crucial for compliance and fraud prevention. Failures at this stage can lead to application rejection or further investigation.

Where to get

Often recorded as an explicit event when an API call to a third-party verification service is made and a response is received.

Capture

Use the timestamp from the log of the identity verification service call and its corresponding success or failure response.

Event type explicit
Initial Screening Performed
Represents an initial, often automated, review of the application to check for data completeness, basic eligibility, or preliminary sanctions list hits. This step quickly filters out clearly ineligible or incomplete applications.
Why it matters

This activity helps measure the quality of incoming applications. A high failure rate here may indicate problems with the application form or instructions.

Where to get

Usually logged as an automated step in a workflow history or inferred from an early status change, such as from 'New' to 'Screening Complete'.

Capture

Identify the timestamp when the initial screening or validation rule completes, often marked by a status update.

Event type inferred
Recommended Optional

Extraction Guides

How to get your data for process mining.

Extraction methods vary by system. For detailed instructions,

read our ETL guide

or select a specific process and system.