Your KYC Customer Onboarding Data Template
Your KYC Customer Onboarding Data Template
This is our generic process mining data template for KYC Customer Onboarding. Use our system-specific templates for more specific guidance.
Select a specific system- A comprehensive, yet flexible, starting point for any KYC onboarding system.
- Identifies crucial data points for effective process discovery and analysis.
- Serves as a universal framework before diving into system-specific details.
KYC Customer Onboarding Attributes
| Name | Description | ||
|---|---|---|---|
| Activity Name ActivityName | The name of the specific business event or task performed within the customer onboarding process. | ||
| Description The Activity Name describes a distinct step or milestone in the customer onboarding journey, such as 'Application Submitted', 'Compliance Review Initiated', or 'Application Approved'. Each activity represents a specific action taken by a user or a system that moves the application forward in the process. This attribute is fundamental for visualizing the process map, which forms the core of process mining. By analyzing the sequence and frequency of different activities, analysts can understand the actual process flow, identify common pathways, discover process deviations, and pinpoint areas of rework or repetition. The clarity and consistency of activity names are crucial for building a meaningful and understandable process model. Why it matters It defines the steps of the process, allowing for the visualization and analysis of the process flow, bottlenecks, and variations. Where to get Found in event logs, audit trails, or transaction tables that record business process steps. Examples Initial Screening PerformedDocuments RequestedRisk Assessment PerformedApplication Approved | |||
| Application ID CustomerApplicationId | The unique identifier for a customer onboarding application, serving as the case ID for process analysis. | ||
| Description The Customer Application ID is a unique key assigned to each new customer onboarding request from the moment it is initiated until it is completed or terminated. This identifier acts as the central thread that connects all individual activities, events, and data points related to a single onboarding journey, making it the most critical attribute for process mining. In analysis, this ID allows the reconstruction of the end-to-end process for each customer. It enables tracking of the application's progress, calculation of its total cycle time, and comparison of its path against others. All process variants, bottlenecks, and performance metrics are analyzed on a per-application basis, which is only possible by correctly identifying and using this attribute as the case ID. Why it matters It is essential for grouping all related events into a single end-to-end process, forming the basis of all process mining analysis. Where to get Typically found in the header or primary table of the customer application or case management system. Examples APP-2023-00123KYC-987654ONB-C-456-7890 | |||
| Event Start Time EventStartTime | The timestamp indicating when a specific activity started or occurred. | ||
| Description The Event Start Time is the precise date and time that marks the beginning of an activity. It is one of the three essential pillars of process mining, alongside the Case ID and Activity Name. This timestamped data allows for the chronological ordering of events within each case, which is necessary to reconstruct the process flow as it happened in reality. This attribute is the basis for all time-related analysis. It is used to calculate the duration of activities (when an end time is available), the waiting time between activities (handoff time), and the total cycle time of the entire onboarding process. Analyzing these durations helps identify bottlenecks, measure SLA adherence, and monitor overall process performance. Why it matters It provides the chronological order of events, which is essential for discovering the process model and calculating all time-based performance metrics. Where to get Located in event logs, application audit trails, or transaction tables, often labeled as 'Timestamp', 'Creation Date', or 'Start Time'. Examples 2023-01-15T09:00:00Z2023-03-20T14:35:10Z2023-05-10T11:21:05Z | |||
| Last Data Update LastDataUpdate | The timestamp indicating the last time the data was refreshed or extracted from the source system. | ||
| Description This attribute records the date and time of the most recent data extraction or refresh. It is not part of the business process itself but is crucial metadata for data validation and governance. It provides transparency about the freshness of the data being analyzed. In process analysis, knowing the last data update time is essential for understanding the timeliness of the insights generated. It helps users trust the data by confirming how current it is and prevents misinterpretations based on outdated information. For ongoing monitoring, this attribute can be used to set up alerts if data refreshes are delayed or fail, ensuring the continuous reliability of the process mining dashboards. Why it matters It ensures data transparency by indicating the freshness of the dataset, which is critical for the relevance and accuracy of the analysis. Where to get Generated during the data extraction, transformation, and loading (ETL) process; often found in the metadata of the dataset. Examples 2023-10-27T02:00:00Z2023-10-26T02:00:00Z2023-10-25T02:00:00Z | |||
| Source System SourceSystem | Identifies the system of record from which the event data originates. | ||
| Description The Source System attribute specifies the application or platform that generated the data for a given activity. In complex environments, the KYC process may span multiple systems, such as a CRM for application submission, a dedicated KYC platform for risk assessment, and a core banking system for account creation. Analyzing the process by source system helps understand the technological landscape and its impact on the process. It can highlight integration issues, data delays between systems, or discrepancies in how different systems record information. This view is valuable for IT and process improvement teams looking to streamline the system architecture supporting the onboarding journey. Why it matters It provides context about where each process step occurs, helping to identify cross-system inefficiencies and data integration challenges. Where to get Often included in data extracts or event logs, especially in environments with multiple integrated systems. Examples CRM_System_AKYC_Platform_BCoreBanking_Sys_C | |||
| Application Status ApplicationStatus | The final outcome or current state of the customer onboarding application. | ||
| Description The Application Status indicates the ultimate disposition of an application, such as 'Approved', 'Rejected', or 'Withdrawn'. It represents the business outcome of the process and is a critical dimension for performance measurement. This attribute is essential for outcome-based analysis. It allows for the comparison of process paths that lead to successful outcomes versus those that result in rejections. Analysts can use this to identify process patterns associated with high rejection rates, calculate KPIs like the 'Application Rejection Rate', and build an 'Onboarding Funnel Analysis' to see where applicants drop off. Understanding why applications fail is the first step toward improving the process to increase the success rate. Why it matters It defines the business outcome of each case, enabling analysis of why applications are rejected and how to improve the approval rate. Where to get Typically found in the main case or application table, indicating the final state of the record. Examples ApprovedRejectedIn ProgressWithdrawn by Customer | |||
| Customer Type CustomerType | Categorization of the customer, such as Individual or Corporate. | ||
| Description The Customer Type classifies the applicant into distinct categories, for example, 'Individual', 'Corporate', 'Trust', or 'Non-Profit'. Different customer types often have vastly different onboarding requirements and process complexities. This is a key segmentation attribute for analysis. By filtering the process map and KPIs by Customer Type, organizations can uncover significant variations. For example, onboarding a corporate client typically involves more complex steps like verifying beneficial ownership, which is not required for an individual. This analysis ensures that each process variant is as efficient as possible for its specific segment and helps in tailoring process improvements. Why it matters It allows for the segmentation of the process to compare and optimize the onboarding journey for different types of customers. Where to get Usually captured at the beginning of the application process and stored in the main customer or application table. Examples IndividualCorporateTrustSmall Business | |||
| Event End Time EventEndTime | The timestamp indicating when a specific activity was completed. | ||
| Description The Event End Time marks the precise date and time an activity concluded. When paired with the Event Start Time, it allows for the exact calculation of processing time for each individual task. Not all systems provide both start and end times; some may only offer a single timestamp representing completion. Having an end time is highly valuable for performance analysis. It enables the creation of detailed metrics such as 'Average Compliance Review Time' by distinguishing between the time an employee actively worked on a task (processing time) and the time the task was waiting in a queue (wait time). This level of detail is crucial for accurately identifying bottlenecks and focusing improvement efforts on either resource capacity or process handoffs. Why it matters It enables the precise calculation of activity processing times, which helps differentiate between active work time and idle wait time. Where to get Found in event logs or transaction tables alongside the start time. May be labeled 'End Time', 'Completion Date', or 'Modified On'. Examples 2023-01-15T17:30:00Z2023-03-21T10:15:20Z2023-05-10T11:55:00Z | |||
| Risk Level RiskLevel | The calculated risk classification of the customer application, such as Low, Medium, or High. | ||
| Description The Risk Level is a critical output of the KYC process, categorizing customers based on factors like their industry, geography, and transaction patterns. This classification determines the level of scrutiny and due diligence required for their application. In process mining, this attribute is a powerful dimension for conformance and variant analysis. The process for a high-risk customer should, by design, be different and more rigorous than for a low-risk one. By comparing the actual process flows for different risk levels against the expected procedures, organizations can check for compliance with internal policies and regulations. It helps answer questions like, 'Are high-risk customers always undergoing enhanced due diligence?' or 'Are we spending too much time on low-risk customers?'. Why it matters It is essential for compliance and risk management, allowing analysis of whether due diligence processes vary appropriately for different risk profiles. Where to get Calculated by a risk engine or manually assigned by a compliance officer. Stored in the main customer or application record. Examples LowMediumHighPEP | |||
| User Department UserDepartment | The business department or team responsible for performing the activity. | ||
| Description The User Department specifies the functional group or team to which the user who performed the activity belongs, such as 'Compliance', 'Client Onboarding', or 'Operations'. This provides a higher-level organizational context compared to the individual User ID. Analyzing the process from a departmental view is critical for understanding cross-functional collaboration and identifying systemic bottlenecks. It helps visualize the handoffs between different teams, which are often a major source of delays and inefficiencies. This information is key for optimizing team structures, clarifying responsibilities, and improving communication channels to create a smoother onboarding experience. Why it matters It enables analysis of process performance and handoffs between different teams, highlighting opportunities for improving cross-functional collaboration. Where to get Often available in user profile data linked to the User ID, or it may be recorded directly on the transaction. Examples ComplianceFront OfficeKYC Operations | |||
| User ID UserId | The user ID or name of the employee or automated agent who performed the activity. | ||
| Description The User ID identifies the person or system bot responsible for executing a specific activity in the process. This could be a compliance officer, a data entry clerk, or an automated risk scoring engine. Consistency in user identification is key for accurate resource analysis. This attribute provides a human-centric view of the process. It is essential for analyzing workload distribution, individual and team performance, and resource allocation. By filtering the process map by User ID, managers can understand how different employees handle tasks, identify training opportunities, and ensure work is balanced. It also helps in collaboration analysis, revealing how work is handed off between different people. Why it matters It allows for analysis of workload, resource performance, and collaboration patterns, enabling better resource management and training. Where to get Available in system audit trails or transaction logs, often linked to the user who created or last modified a record. Examples john.doeSYSTEM_AUTOuser12345 | |||
| Application Channel ApplicationChannel | The channel through which the customer application was submitted. | ||
| Description This attribute identifies the method used by the customer to submit their application, such as 'Web Portal', 'Mobile App', or 'In-Branch'. Different channels may have different data capture processes and customer experiences. Analyzing the process by channel helps evaluate the performance and efficiency of each customer touchpoint. It can answer questions like, 'Do mobile applications get processed faster than web applications?' or 'Is the rework rate higher for applications submitted in-branch?'. These insights are valuable for optimizing the customer journey across all channels and allocating resources effectively. Why it matters It enables comparison of process efficiency and customer experience across different submission channels, such as web, mobile, or in-person. Where to get Typically recorded at the very beginning of the process when the application is first created. Examples Web PortalMobile AppIn-Branch | |||
| Customer Country CustomerCountry | The country of residence or incorporation for the customer. | ||
| Description The Customer Country specifies the geographic location of the applicant. This is a vital piece of information in KYC processes, as regulations and risk factors can vary significantly from one country to another. Geographic analysis provides another important layer of insight. Onboarding processes may differ based on country-specific legal requirements. By filtering by Customer Country, companies can verify that these jurisdictional variants are being followed correctly. It can also reveal performance differences, such as longer cycle times for applications from high-risk countries, which may be expected due to enhanced due diligence requirements. Why it matters It allows for analysis of process variations and performance based on geography, which is critical for ensuring compliance with local regulations. Where to get Captured from the customer during the application process and stored on the customer or application record. Examples USAGBRSGPDEU | |||
| Customer ID CustomerId | The unique identifier for the customer entity being onboarded. | ||
| Description The Customer ID is a unique identifier for the customer that persists across multiple interactions or applications. While the Customer Application ID tracks a single onboarding journey, the Customer ID can link multiple onboarding attempts or other processes for the same customer. This attribute provides a customer-centric analysis that extends beyond a single case. It is useful for understanding repeat applicants, analyzing the long-term relationship of a customer, or connecting the onboarding process to other processes like 'Loan Application' or 'Account Maintenance'. While not essential for a single-process view, it enriches the data for more complex, object-centric process mining. Why it matters It allows for a customer-centric view, linking multiple onboarding attempts or different processes related to the same customer. Where to get Usually found in a central customer master data system and linked to the application record. Examples CUST-1005678943210AENT-4590 | |||
| Is Automated IsAutomated | A flag indicating whether an activity was performed automatically by the system or manually by a user. | ||
| Description This boolean attribute distinguishes between tasks executed by software or bots and those performed by human users. Automated activities might include initial data validation, sanctions screening, or sending standardized communications. Analyzing this attribute is crucial for evaluating the effectiveness of automation initiatives. By comparing the speed and outcomes of automated steps versus manual ones, businesses can identify opportunities for further automation to reduce costs and cycle times. It also helps in monitoring the performance of automated systems and ensuring they are functioning as expected within the end-to-end process. Why it matters It helps measure the impact and efficiency of automation in the process, identifying opportunities for further robotic or systematic improvements. Where to get Can be a dedicated field in the event log or derived based on the User ID, for instance, if the ID is 'SYSTEM' or 'BOT'. Examples truefalse | |||
| Rejection Reason RejectionReason | The specific reason provided when a customer application is rejected. | ||
| Description When an application's status is 'Rejected', the Rejection Reason provides the specific cause, such as 'Incomplete Documentation', 'High Risk Profile', or 'Sanctions Match'. This attribute adds crucial context to failed processes. Analyzing rejection reasons is fundamental to the 'Application Rejection Analysis' dashboard. It helps businesses perform root cause analysis to understand the most common failure points in the onboarding process. By categorizing and quantifying these reasons, organizations can prioritize improvements. For example, if 'Incomplete Documentation' is a top reason, the company might focus on clarifying instructions for customers or improving the document submission portal. Why it matters It provides the root cause for failed applications, enabling targeted improvements to reduce the rejection rate and improve customer experience. Where to get Usually stored in the main application or case table, often populated when the status is set to 'Rejected'. Examples Failed Identity VerificationIncomplete DocumentationHigh RiskPEP Match | |||
| SLA Target Date SlaTargetDate | The date by which the customer onboarding process is expected to be completed. | ||
| Description The Service Level Agreement (SLA) Target Date is the deadline set for completing the customer onboarding process. This date is often determined by internal policies or contractual obligations and serves as a benchmark for measuring timeliness. This attribute is the foundation for the 'SLA Performance Monitoring' dashboard. By comparing the actual completion date of an application with its SLA Target Date, the 'SLA Adherence Rate' can be calculated. Analyzing cases that missed their SLA helps identify the specific activities or departments causing delays. This allows for proactive management of work queues and resource allocation to minimize SLA breaches and improve customer satisfaction. Why it matters It provides a performance benchmark, enabling the measurement of SLA adherence and the identification of cases at risk of delay. Where to get Often calculated and stored on the main application record when the case is created, based on application type or other criteria. Examples 2023-01-30T23:59:59Z2023-04-15T23:59:59Z2023-06-01T23:59:59Z | |||
KYC Customer Onboarding Activities
| Activity | Description | ||
|---|---|---|---|
| Additional Information Requested | Represents an event where a reviewer requires more information or documentation from the customer to proceed. This action creates a rework loop and pauses the internal process. | ||
| Why it matters This is a primary driver of process inefficiency and prolonged cycle times. High frequency of this activity indicates issues with initial data collection. Where to get Usually captured explicitly as it often involves sending a notification to the customer and is logged in communication or audit trails. Capture Use the timestamp of a 'Request for Information' event, a specific status change, or a logged communication to the customer. Event type explicit | |||
| Application Approved | This activity represents the final business decision to approve the customer's application for onboarding. It is a key milestone indicating a successful outcome of the KYC process. | ||
| Why it matters This is a critical success event and a terminal point for the decision-making process. It allows for analysis of approval rates and time-to-approve. Where to get This is typically captured as a distinct and final status change in the application's lifecycle, recorded in the case management system. Capture Identify the timestamp when the application's final status is set to 'Approved' or a similar terminal success state. Event type inferred | |||
| Application Rejected | Represents the final decision to reject the customer's application, terminating the onboarding process. This is a critical negative outcome of the process. | ||
| Why it matters This is a key failure event. Analyzing when and why rejections occur is essential for process improvement and understanding customer friction. Where to get This is captured via a final, terminal status change on the application record, such as 'Rejected' or 'Declined'. Capture Identify the timestamp when the application's final status is set to 'Rejected' or a similar terminal failure state. Event type inferred | |||
| Application Submitted | This activity marks the start of the customer onboarding process. It is captured when a new customer application is formally received by the system, either through a customer-facing portal or internal data entry. | ||
| Why it matters This is the primary start event for the process. Analyzing the volume and timing of submissions is fundamental to understanding demand and capacity. Where to get This event is typically captured from an application creation log or the first entry in a case management system's audit trail. Capture Use the creation timestamp of the application or case record. Event type explicit | |||
| Compliance Review Initiated | This activity marks the start of the manual review phase by the compliance department. It typically occurs for high-risk or flagged applications and represents a critical handoff to a specialized team. | ||
| Why it matters Tracking this activity is crucial for identifying bottlenecks in the compliance process. The time until completion is a key component of the overall cycle time. Where to get This event is often inferred from a change in case status or from an audit log showing the case was assigned to a compliance officer's work queue. Capture Identify the timestamp when the application's status changes to 'Pending Compliance' or when it is assigned to a compliance work queue. Event type inferred | |||
| Onboarding Completed | This is the final activity in the process, signifying that the customer is fully onboarded and the application case is administratively closed. The customer is now ready to transact. | ||
| Why it matters This is the ultimate end event for successful cases. The total time to reach this activity represents the full customer onboarding journey time. Where to get Inferred from a final, terminal status like 'Onboarded' or 'Closed - Approved' being applied to the case in the source system. Capture Use the timestamp of the final case closing event or when the status is updated to a terminal 'Completed' state. Event type inferred | |||
| Risk Assessment Performed | This activity represents the execution of a decisioning engine or a manual process to calculate a risk score for the customer application. It consolidates information to classify the customer's risk level. | ||
| Why it matters The outcome of the risk assessment often determines the subsequent process path, such as straight-through processing versus manual compliance review. Where to get As a core function, this is often captured as an explicit event when the risk assessment rule set is executed or a risk score field is populated. Capture Use the timestamp from the log of the risk engine execution or the audit trail for the risk score field. Event type explicit | |||
| Account Created | Following approval, this activity marks the technical creation of the customer's account in the core banking or user management system. This moves the customer from applicant to active. | ||
| Why it matters This measures the efficiency of the handoff between the decision-making process and the technical provisioning systems. Where to get Often an explicit event logged by the onboarding system after receiving a success confirmation from a downstream system, or from the creation date in the core system. Capture Use the account creation timestamp from the core system, or the confirmation event logged in the onboarding system. Event type explicit | |||
| Background Check Initiated | This represents the point where automated or manual background checks, such as AML, PEP, or credit history screenings, are started. This often involves triggering external service providers. | ||
| Why it matters The duration of background checks can be a major source of delay. Tracking the initiation helps measure the time spent waiting for third-party results. Where to get This is often logged as an explicit event when the system triggers these checks or inferred from a status change like 'Pending Background Check'. Capture Use the timestamp from the API call to the background check service or the log entry indicating the check was started. Event type explicit | |||
| Compliance Review Completed | Marks the end of the manual review by the compliance department. The compliance officer has made a decision to approve, reject, or request further action on the application. | ||
| Why it matters This milestone concludes a critical and often lengthy stage. Analyzing the time leading up to this point helps measure compliance team efficiency. Where to get This activity is typically inferred from a case status change from 'Pending Compliance' to a subsequent state like 'Compliance Approved'. Capture Use the timestamp when a compliance review task is marked 'Complete' or when the case status is updated to reflect the review's outcome. Event type inferred | |||
| Document Review Completed | This activity signifies that an agent or an automated tool has finished reviewing the documents submitted by the customer. The documents have been checked for authenticity, validity, and completeness. | ||
| Why it matters The duration of document review is often a significant part of the total processing time. Analyzing this step helps identify resource or training needs. Where to get This is often inferred from a status change on the document or the overall case, such as 'Documents Verified' or 'Review Complete'. Capture Identify the timestamp when a manual review task is marked as complete or when the case status updates to reflect successful document verification. Event type inferred | |||
| Documents Received | This activity marks the point when the customer has provided the required identification and supporting documents. The documents are now available in the system for review. | ||
| Why it matters This event is critical for measuring customer response times and identifying delays caused by the applicant. Where to get Typically captured as distinct, explicit events in the system's document management log or case audit trail upon each document upload. Capture Use the timestamp associated with the creation or upload of document attachments linked to the application case. Event type explicit | |||
| Documents Requested | This activity occurs when the system or an agent determines that specific documents are required from the customer to proceed with verification. It represents a formal request for information being sent to the applicant. | ||
| Why it matters Tracking this helps understand process-driven delays. The time between this event and 'Documents Received' is customer waiting time. Where to get This can be captured from system-generated communication logs, email records, or a status change indicating the case is 'Awaiting Documents'. Capture Use the timestamp of the communication sent to the customer or the status change to a 'Pending Documents' state. Event type explicit | |||
| Identity Verification Performed | Represents an automated or manual check to validate the customer's identity against external or internal data sources. This is a core verification step in the KYC process. | ||
| Why it matters This activity is crucial for compliance and fraud prevention. Failures at this stage can lead to application rejection or further investigation. Where to get Often recorded as an explicit event when an API call to a third-party verification service is made and a response is received. Capture Use the timestamp from the log of the identity verification service call and its corresponding success or failure response. Event type explicit | |||
| Initial Screening Performed | Represents an initial, often automated, review of the application to check for data completeness, basic eligibility, or preliminary sanctions list hits. This step quickly filters out clearly ineligible or incomplete applications. | ||
| Why it matters This activity helps measure the quality of incoming applications. A high failure rate here may indicate problems with the application form or instructions. Where to get Usually logged as an automated step in a workflow history or inferred from an early status change, such as from 'New' to 'Screening Complete'. Capture Identify the timestamp when the initial screening or validation rule completes, often marked by a status update. Event type inferred | |||
Extraction Guides
Extraction methods vary by system. For detailed instructions,