{"id":5044,"date":"2026-01-28T15:22:38","date_gmt":"2026-01-28T22:22:38","guid":{"rendered":"https:\/\/quienesquien.mx\/?p=5044"},"modified":"2026-03-12T13:04:15","modified_gmt":"2026-03-12T20:04:15","slug":"que-es-kyc-y-como-implementarlo","status":"publish","type":"post","link":"https:\/\/quienesquien.mx\/en\/que-es-kyc-y-como-implementarlo\/","title":{"rendered":"What is KYC and how to implement it"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"5044\" class=\"elementor elementor-5044\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3d80f63 e-flex e-con-boxed e-con e-parent\" data-id=\"3d80f63\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2079a701 elementor-widget elementor-widget-text-editor\" data-id=\"2079a701\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<h1>A strong KYC reduces uncertainty, not just risks.<\/h1>\n<p class=\"cvGsUA direction-ltr align-start para-style-body\"><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">KYC (Know Your Customer) is the process for <strong>identify and verify<\/strong> to the <strong>client or third party<\/strong>, understand who is d<\/span><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">behind (control\/beneficiary), know the <strong>purpose of the relationship<\/strong> and apply continuous monitoring proportional to the risk.<\/span><\/p>\n<h3><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">Quick example (B2B)<\/span><\/h3>\n<p><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">A company opens an account or contracts a service. The KYC process doesn&#039;t end with the articles of incorporation: it also involves validating representatives, understanding the control structure, and documenting relevant findings to make consistent decisions.<\/span><\/p>\n<h2><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">KYC vs CDD vs EDD (to speak the same language):<\/span><\/h2>\n<ul>\n<li><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\"><strong>KYC<\/strong>: operational term, Know your customer, used on a daily basis.<\/span><\/li>\n<li><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\"><strong>CDD<\/strong> (Customer Due Diligence): framework that includes identity, control, purpose, and monitoring.<\/span><\/li>\n<li><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\"><strong>EDD<\/strong> (Enhanced Due Diligence): applies when the risk is greater and more depth and documentation are required.<\/span><\/li>\n<\/ul>\n<p class=\"cvGsUA direction-ltr align-start para-style-body\"><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\"><br>KYC <strong>It&#039;s not just about asking for documents<\/strong>. It&#039;s an organized way to know who your company is dealing with, validate key data, and <strong>leave <\/strong><\/span><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\"><strong>clear evidence<\/strong> of what was reviewed and <strong>how a decision was made<\/strong>. In this guide you will find simple concepts, step-by-step instructions, and common mistakes. <\/span><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">common to apply it in Mexico <strong>without complicating the operation<\/strong>.<\/span><\/p>\n<h3><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">What is KYC in seconds (quick overview)<\/span><\/h3>\n<ul>\n<li><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">KYC helps <strong>make decisions in an orderly manner<\/strong>: knowing who your company is related to and why a registration was approved (or not).<\/span><\/li>\n<li><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">The evidence and<strong>It&#039;s part of the control<\/strong>Record what you consulted, when, what you found, and how it was resolved.<\/span><\/li>\n<li><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">Well done, <strong>saves time<\/strong>: reduces back-and-forth dealings with incomplete files and improves consistency during audits.<\/span><\/li>\n<li><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">It includes a <strong>checklist<\/strong> to standardize the process without making it bureaucratic.<\/span><\/li>\n<\/ul>\n<h2><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">Introduction<\/span><\/h2>\n<p><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">If your team needs <strong>register clients or third parties<\/strong> fast, but it must also meet controls of <strong>PLD\/FT<\/strong>, It&#039;s normal to feel like KYC is a hindrance. In practice, the problem isn&#039;t KYC itself: it&#039;s that each department asks for different things, information is repeated, and the file becomes cluttered. <strong>incomplete<\/strong>.<\/span><\/p>\n<figure id=\"attachment_5052\" aria-describedby=\"caption-attachment-5052\" style=\"width: 689px\" class=\"wp-caption aligncenter\"><img fetchpriority=\"high\" decoding=\"async\" class=\"wp-image-5052\" src=\"https:\/\/quienesquien.mx\/wp-content\/uploads\/2026\/01\/IDENTIDAD-quien-es-300x169.jpg\" alt=\"\" width=\"689\" height=\"388\" srcset=\"https:\/\/quienesquien.mx\/wp-content\/uploads\/2026\/01\/IDENTIDAD-quien-es-300x169.jpg 300w, https:\/\/quienesquien.mx\/wp-content\/uploads\/2026\/01\/IDENTIDAD-quien-es-1024x576.jpg 1024w, https:\/\/quienesquien.mx\/wp-content\/uploads\/2026\/01\/IDENTIDAD-quien-es-768x432.jpg 768w, https:\/\/quienesquien.mx\/wp-content\/uploads\/2026\/01\/IDENTIDAD-quien-es-1536x864.jpg 1536w, https:\/\/quienesquien.mx\/wp-content\/uploads\/2026\/01\/IDENTIDAD-quien-es-18x10.jpg 18w, https:\/\/quienesquien.mx\/wp-content\/uploads\/2026\/01\/IDENTIDAD-quien-es.jpg 1920w\" sizes=\"(max-width: 689px) 100vw, 689px\" \/><figcaption id=\"caption-attachment-5052\" class=\"wp-caption-text\"><em>KYC in 4 layers: identity, control, purpose and monitoring.<\/em><\/figcaption><\/figure>\n<p class=\"cvGsUA direction-ltr align-start para-style-body\"><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">A well-designed KYC does the opposite: <strong>orders and accelerates<\/strong>. Define what data to request, what to validate, and how. <strong>classify risk<\/strong> and how <strong>leave evidence<\/strong> so that anyone (or an auditor) understands what was reviewed and why. In Mexico, this approach is related to AML\/CFT practices and, in certain sectors, to specific obligations (for example, Vulnerable Activities under the LFPIORPI).<\/span><\/p>\n<p class=\"cvGsUA direction-ltr align-start para-style-body\"><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">Related reading: <\/span><a class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-underline text-strikethrough-none\" draggable=\"false\" href=\"https:\/\/quienesquien.mx\/en\/q-suite\/\" target=\"_blank\" rel=\"noopener\">Q-Suite<\/a><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\"> (resources and webinars to strengthen compliance).<\/span><\/p>\n<h2><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">Key concepts<\/span><\/h2>\n<p class=\"cvGsUA direction-ltr align-start para-style-body\"><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\"><strong>Beneficiary controller<\/strong> (why it matters):<\/span><\/p>\n<p class=\"cvGsUA direction-ltr align-start para-style-body\"><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">Operational translation: If you only validate the company name but don&#039;t understand who controls or benefits from it, your risk assessment <strong>remains incomplete<\/strong>. The important thing is that the file explains how that control was determined, with evidence.<\/span><\/p>\n<p class=\"cvGsUA direction-ltr align-start para-style-body\"><a class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-underline text-strikethrough-none\" draggable=\"false\" href=\"https:\/\/quienesquien.mx\/en\/listas\/\" target=\"_blank\" rel=\"noopener\">Lists in KYC<\/a><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">: <strong>not all of them serve the same purpose<\/strong>.<br><\/span><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">To avoid confusion, separate by <strong>list type<\/strong> and document what was consulted, when, and what the resolution was.<\/span><\/p>\n<figure id=\"attachment_5054\" aria-describedby=\"caption-attachment-5054\" style=\"width: 689px\" class=\"wp-caption aligncenter\"><img decoding=\"async\" class=\"wp-image-5054\" src=\"https:\/\/quienesquien.mx\/wp-content\/uploads\/2026\/01\/IDENTIDAD-quien-es-2-300x169.jpg\" alt=\"\" width=\"689\" height=\"388\" srcset=\"https:\/\/quienesquien.mx\/wp-content\/uploads\/2026\/01\/IDENTIDAD-quien-es-2-300x169.jpg 300w, https:\/\/quienesquien.mx\/wp-content\/uploads\/2026\/01\/IDENTIDAD-quien-es-2-1024x576.jpg 1024w, https:\/\/quienesquien.mx\/wp-content\/uploads\/2026\/01\/IDENTIDAD-quien-es-2-768x432.jpg 768w, https:\/\/quienesquien.mx\/wp-content\/uploads\/2026\/01\/IDENTIDAD-quien-es-2-1536x864.jpg 1536w, https:\/\/quienesquien.mx\/wp-content\/uploads\/2026\/01\/IDENTIDAD-quien-es-2-18x10.jpg 18w, https:\/\/quienesquien.mx\/wp-content\/uploads\/2026\/01\/IDENTIDAD-quien-es-2.jpg 1920w\" sizes=\"(max-width: 689px) 100vw, 689px\" \/><figcaption id=\"caption-attachment-5054\" class=\"wp-caption-text\"><em>Impacts of a weak KYC.<\/em><\/figcaption><\/figure>\n<h2><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">Why it matters \/ Impact of not doing it<\/span><\/h2>\n<p class=\"cvGsUA direction-ltr align-start para-style-body\"><strong><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">Operation<\/span><\/strong><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">Time and effort are wasted due to incomplete files and last-minute corrections; friction with the commercial area increases.<br><\/span><strong><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">Audit<\/span><\/strong><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">Controls without evidence (no log, date\/time or documented resolution) are difficult to defend.<br><\/span><strong><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">Risk management<\/span><\/strong><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">Treating everyone the same causes the team to invest effort where it is not needed and arrive late to complex cases.<br><\/span><strong><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">Reputation<\/span><\/strong><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">Third parties may question the consistency of its process and governance.<br><\/span><\/p>\n<h2><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\"><br>How to do it step by step<\/span><\/h2>\n<h3>Key idea<\/h3>\n<ul>\n<li><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">Each step must answer: <strong>to do<\/strong> y <strong>what to save<\/strong> as evidence.<\/span><\/li>\n<li><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">The goal is to have a process <strong>fast<\/strong>, <strong>repeatable<\/strong> y <strong>defensible<\/strong>.<br><\/span><\/li>\n<\/ul>\n<p class=\"cvGsUA direction-ltr align-start para-style-body\"><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\"><br>Step 1. <strong>Define scope and policy<\/strong><\/span><\/p>\n<ul>\n<li><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">Determine if it applies to customers, suppliers, candidates, or partners.<\/span><\/li>\n<li><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">Define roles, approvals, and timelines.<\/span><\/li>\n<li><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">Establish the order: high, relevant changes, and frequency.<br><\/span><\/li>\n<\/ul>\n<p class=\"cvGsUA direction-ltr align-start para-style-body\"><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\"><br>Step 2. <strong>Standardize minimum data<\/strong><\/span><\/p>\n<ul>\n<li><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">Use a single set of fields for natural and legal persons.<\/span><\/li>\n<li><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">Include representatives and powers where applicable.<\/span><\/li>\n<li><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">Avoid asking for &quot;more than necessary&quot;: focus on usefulness and traceability.<\/span><\/li>\n<\/ul>\n<p class=\"cvGsUA direction-ltr align-start para-style-body\"><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\"><br>Step 3. <strong>Identity verification (and documentation)<\/strong><\/span><\/p>\n<ul>\n<li><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">Verify identities with reliable and independent sources, according to their policy.<\/span><\/li>\n<li><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">Record exceptions and who authorizes them.<\/span><\/li>\n<\/ul>\n<p class=\"cvGsUA direction-ltr align-start para-style-body\"><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\"><br>Step 4. <strong>Identification of control\/beneficiary<\/strong><\/span><\/p>\n<ul>\n<li><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">Document ownership\/control structure.<\/span><\/li>\n<li><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">Describe how you reached your conclusion and what evidence supports it.<\/span><\/li>\n<\/ul>\n<p class=\"cvGsUA direction-ltr align-start para-style-body\"><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\"><br>Step 5. <strong>Searching and verifying lists (and resolving matches)<\/strong><\/span><\/p>\n<ul>\n<li><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">Search lists by name and reasonable aliases.<\/span><\/li>\n<li><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">Define tie-breaking rules for false positives (e.g., date of birth, country, identifiers).<\/span><\/li>\n<li><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">Document the resolution and approval.<\/span><\/li>\n<\/ul>\n<p class=\"cvGsUA direction-ltr align-start para-style-body\"><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\"><br>Step 6. <strong>Simple risk classification<\/strong><\/span><\/p>\n<ul>\n<li><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">Use explainable criteria: industry, jurisdiction, complexity, product\/service, and findings.<\/span><\/li>\n<li><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">Avoid &quot;black box&quot; models at the beginning.<\/span><\/li>\n<\/ul>\n<p class=\"cvGsUA direction-ltr align-start para-style-body\"><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\"><br>Step 7. <strong>Periodic monitoring and updates<\/strong><\/span><\/p>\n<ul>\n<li><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">Define frequency by risk level.<\/span><\/li>\n<li><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">It establishes triggers: changes in shareholders, representatives, business activity, country, or behavior.<\/span><\/li>\n<\/ul>\n<h2><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">Common mistakes and how to avoid them<\/span><\/h2>\n<ul>\n<li><strong><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">Each area requires different things.<\/span><\/strong><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">: Unify forms and define a minimum viable product per customer type.<\/span><\/li>\n<li><strong><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">Requesting documents without understanding the profile<\/span><\/strong><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">: Connects data with purpose, activity, and expected profile.<\/span><\/li>\n<li><strong><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">Do not validate representatives or signatories<\/span><\/strong><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">Define clear rules for verifying authorization and identity.<\/span><\/li>\n<li><strong><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">Do not document matches in lists<\/span><\/strong><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">: Keep evidence of the outcome and the resolution (who approved and why).<\/span><\/li>\n<li><strong><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">Apply the same level of diligence to everyone<\/span><\/strong><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">: Uses a simplified Risk-Based Approach (RBA) at low risk and a reinforced approach at high risk.<\/span><\/li>\n<li><strong><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">One-time KYC<\/span><\/strong><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">: Implements updates based on risk level and relevant events.<\/span><\/li>\n<\/ul>\n<h2 style=\"text-align: center;\"><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">Next step: <\/span><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">Review the scheme that best fits your operation.<u><br><\/u><\/span><\/h2>\n<p style=\"text-align: center;\"><span style=\"color: #002169;\"><strong><a class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-underline text-strikethrough-none\" style=\"color: #002169;\" draggable=\"false\" href=\"https:\/\/calendly.com\/ventas-quienesquien\/demo-servicios?month=2026-01\" target=\"_blank\" rel=\"noopener\"><u>Schedule a meeting with our team to receive professional support.<\/u><\/a> <\/strong><\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Un KYC s\u00f3lido reduce incertidumbre, no solo riesgos. KYC (Know Your Customer \/ Conoce a tu cliente) es el proceso para identificar y verificar al cliente o tercero, entender qui\u00e9n est\u00e1 detr\u00e1s (control\/beneficiario), conocer el prop\u00f3sito de la relaci\u00f3n y aplicar monitoreo continuo proporcional al riesgo. Ejemplo r\u00e1pido (B2B) Una empresa abre una cuenta o [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":5115,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[125,124],"tags":[],"class_list":["post-5044","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actividades-vulnerables","category-sector-financiero"],"_links":{"self":[{"href":"https:\/\/quienesquien.mx\/en\/wp-json\/wp\/v2\/posts\/5044","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/quienesquien.mx\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/quienesquien.mx\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/quienesquien.mx\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/quienesquien.mx\/en\/wp-json\/wp\/v2\/comments?post=5044"}],"version-history":[{"count":24,"href":"https:\/\/quienesquien.mx\/en\/wp-json\/wp\/v2\/posts\/5044\/revisions"}],"predecessor-version":[{"id":5330,"href":"https:\/\/quienesquien.mx\/en\/wp-json\/wp\/v2\/posts\/5044\/revisions\/5330"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/quienesquien.mx\/en\/wp-json\/wp\/v2\/media\/5115"}],"wp:attachment":[{"href":"https:\/\/quienesquien.mx\/en\/wp-json\/wp\/v2\/media?parent=5044"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/quienesquien.mx\/en\/wp-json\/wp\/v2\/categories?post=5044"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/quienesquien.mx\/en\/wp-json\/wp\/v2\/tags?post=5044"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}