KYC & Verification Policy
Effective Date: 01 November 2025
🎥 Video KYC Process — Step-by-Step
1️⃣ Customer Initiation
- You will receive a secure Video KYC link from our official domain or email only.
- Before starting, please ensure:
- A stable internet connection
- A smartphone or laptop with camera & microphone access
- Valid PAN card and Aadhaar card
2️⃣ Consent & Identity Confirmation
- You will be asked to provide consent to record the KYC video.
- Our verification officer will explain the process before beginning.
- The video session will be recorded only for compliance purposes.
3️⃣ Document Verification
- Show your PAN Card clearly to the camera.
- If requested, also display your Aadhaar or other valid ID proof.
- The officer will take a live capture for record purposes.
-
For Individuals: Aadhaar, PAN Card, Passport, or Driver’s License
For Businesses: GST Certificate, Business Registration Proof, Utility Bill
4️⃣ Facial & Liveness Check
- Look straight into the camera.
- You may be asked to blink, smile, or read a number aloud to confirm your presence.
5️⃣ Location Verification
- The system automatically captures your live location (Geo-tag) to confirm that you are present within India.
- You may be asked to show your surroundings briefly on camera.
6️⃣ Officer Interaction
- The verification officer will ask basic questions such as:
- Your Full Name
- Date of Birth
- Address
- Purpose of the verification
7️⃣ Signature or OTP Verification
- You may be asked to sign on white paper and show it to the camera.
🚫 Important Security Note:
👉 Do not share any OTP, password, PIN, or verification code with anyone.
👉 Console Exchange Global will NEVER ask for any OTP or secret number during or after your Video KYC session.
8️⃣ Completion & Confirmation
- Once all details are verified, the officer ends the recording.
- Your KYC data is securely submitted for internal review.
- You will receive a confirmation email once verification is approved.
🛡️ Privacy & Confidentiality
All KYC data, documents, and recordings are fully encrypted and stored securely. Identities and proofs are kept strictly confidential and accessed only by authorized compliance officers.