“If you want to play in this particular industry, there is a responsibility that comes with it, just like being a doctor or being a lawyer.Keep Reading
There are certain fields in certain industries where there is a moral, and ethical responsibility, and think telecom is there now. We have to bring KYC into this industry.”
— Rebekah Johnson, Founder & CEO, Numeracle
Carrying bad actor traffic due to poor Know Your Customer practices can result in heavy fines, investigations, and blocked traffic.
The good news is that you can implement Know Your Customer for your business or on behalf of those you represent, as long as you also define and uphold the mechanisms and processes you set out to meet KYC requirements. It's never too late to start, but it isn't enough to set it and forget it. Ensure you're conducting the necessary due diligence to follow your KYC procedures.
As the leader who brought Know Your Customer to communications, Rebekah has advocated for KYC on all fronts while simultaneously creating a KYC-compliant platform for Numeracle's customers and legal callers to protect calling identities.
With 10+ years of experience in risk mitigation and policy creation, Sarah is an industry expert in trust solutions and KYC. Her work in support of the delivery of compliant traffic to minimize scam/spam illegal traffic and efforts to build trusted voice solutions give her the expertise to recommend KYC best practices for identity vetting and call authentication.
As a leading telecom attorney and robocall policy expert, Keith focuses on ensuring the regulatory environment understands the threat to legal communications posed by the fight against illegal robocalls, recognizing the need for KYC and Know Your Upstream Provider processes.
Numeracle leadership hosted an expert panel at the 2023 KYC Summit hosted by the SIP Forum to discuss the practicalities of deploying a KYC framework in telecommunications to bring purpose to the STIR/SHAKEN protocol.
Our key mission? To share how very doable, possible, and necessary it is to deploy a KYC framework within your organization to vet and verify the identities of each and every entity utilizing the network.