Feature

Checker Module

Dual-approval maker-checker workflow that enforces compliance at every step. No verification decision goes unchecked, no audit trail goes incomplete.

Overview

Two Eyes Are Better Than One

The Checker Module implements a rigorous maker-checker paradigm where every verification goes through a two-stage approval process. The maker (verification agent) completes the initial KYC session and submits their assessment. A designated checker (supervisor) then independently reviews the evidence, recordings, and extracted data before rendering a final decision. This dual-control mechanism eliminates single-point-of-failure risks, satisfies regulatory mandates for segregation of duties, and creates a tamper-proof audit trail that stands up to the most demanding compliance audits.

Key Highlights

  • Maker-checker dual-approval enforcing segregation of duties
  • Priority-based approval queues with configurable SLA timers
  • Immutable audit trail with timestamped reviewer actions
  • Role-based access ensuring checkers cannot be the same as makers
  • Rejection workflows with mandatory reason codes and escalation paths

Capabilities

What You Can Do

Maker-Checker Workflow

Define multi-tier approval chains where agents submit verifications and supervisors independently review every decision. Configure rules for auto-assignment, escalation thresholds, and mandatory review criteria based on risk level or customer segment.

Smart Approval Queues

Prioritized queues automatically sort pending reviews by urgency, SLA deadline, and risk score. Supervisors see high-priority cases first, with real-time counters showing queue depth and average wait times to prevent bottlenecks.

Complete Audit Trail

Every action -- from initial submission to final approval or rejection -- is logged with timestamps, user identities, and decision rationale. Generate audit reports for regulatory submissions with a single click, covering any date range or case subset.

How It Works

01

Agent Verifies

The verification agent (maker) conducts the video KYC session, captures documents, performs identity checks, and submits their assessment with all supporting evidence attached to the case file.

02

Supervisor Reviews

The case enters the checker queue where a supervisor independently reviews the video recording, document extractions, face-match scores, and agent notes. They can approve, reject, or send back for re-verification.

03

Final Approval & Audit Log

Upon checker approval, the case is finalized with a complete audit log capturing both maker and checker decisions, timestamps, and rationale. The immutable record is available for compliance reporting and regulatory review.

Compliance

Regulatory-Grade Approval Workflows

RBI V-CIP Maker-Checker Mandate

The RBI Master Direction on KYC (updated 2023) and the Video-based Customer Identification Process (V-CIP) circular mandate that no single individual may both conduct and approve a video KYC verification. Our Checker Module enforces this segregation of duties at the system level, making it impossible for the same user to act as both maker and checker on any case.

Dual-Approval Audit Trails

Every maker submission and checker decision is recorded with immutable timestamps, user identity, IP address, and decision rationale. These audit trails satisfy requirements under RBI's Master Direction on IT Governance (2023) and SEBI Circular SEBI/HO/MIRSD/DoP/P/CIR/2023/37 for maintaining verifiable records of customer due diligence activities.

SLA Enforcement & Escalation

Configurable SLA timers ensure checker reviews are completed within regulatory timeframes. Cases approaching breach thresholds are automatically escalated to senior supervisors. This aligns with RBI's expectation under the Risk-Based Approach guidelines that institutions maintain timely completion of CDD processes without undue delay to customers.

Role-Based Segregation of Duties

Access controls enforce that makers, checkers, and supervisors operate within distinct permission boundaries. This satisfies the Internal Audit and Compliance requirements under RBI's Guidelines on Managing Risks in Outsourcing and the IRDAI Master Circular on Anti-Money Laundering, which mandate clear segregation between verification and approval functions.

Specifications

Technical Specifications

3-Tier

Approval Hierarchy

RBAC

Role-Based Access

Auto

Configurable Escalation

Bulk

Batch Processing

Immutable

Audit Trail Logs

Custom SLA

Per Verification Type

Mandatory

Rejection Reason Codes

Real-Time

Queue Priority Sorting

Related Use Cases

Further Reading

Compliance Without Compromise

Implement dual-approval workflows that satisfy regulators and protect your organization from verification errors.