Know Your Customer (KYC) Model: A Legal Reform Strategy to Prevent Abuse of Financial Services in Child Sexual Exploitation Transactions

Authors

  • Zentoni Universitas Diponegoro, Indonesia Author
  • Budi Santoso Universitas Diponegoro, Indonesia Author
  • David M. L. Tobing Universitas Diponegoro, Indonesia Author
  • Zico Junius Fernando Universitas Bengkulu, Indonesia Author https://orcid.org/0000-0001-7285-2147

DOI:

https://doi.org/10.15294/jllr.v6i1.19651

Keywords:

KYC, Financial Institutions, Child Sexual Exploitation, Transaction Monitoring, Suspicious Activities

Abstract

KYC (Know Your Customer) is a process undertaken by financial institutions to identify and verify the identity of their customers. The aim is to prevent financial crimes such as money laundering, fraud and terrorist financing. This Know Your Customer (KYC) model can be used as a strategic framework for financial institutions to prevent misuse of financial services including child sexual exploitation transactions that are rampant. The model emphasizes rigorous customer identification, verification and continuous monitoring of transactions to detect suspicious activity. By carefully understanding customer financial behavior, financial institutions can identify anomalies that may indicate illicit activities, including those related to child exploitation. Globally, financial service providers including major banks such as HSBC, JPMorgan Chase, and Citigroup, as well as digital payment platforms such as PayPal and Stripe exemplify and can play a key role in preventing child sexual exploitation. This research uses normative legal research methods. The nature of this research is descriptive-prescriptive. The result of this research states that in the future, financial institutions can implement strict KYC (Know Your Customer) policies, monitor suspicious transactions, and cooperate with law enforcement agencies from various countries. This comprehensive approach not only helps combat child exploitation, but also improves global regulatory compliance, thus maintaining the integrity of the financial system. The implementation of the KYC model involves collaboration with law enforcement and utilizes advanced technology for efficient data analysis and customer monitoring. Ultimately, this model serves to protect vulnerable populations while upholding ethical standards within the financial sector.

References

Josenhans, Valentine, et al. “Gender, rights and responsibilities: The need for a global analysis of the sexual exploitation of boys.” Child Abuse & Neglect 110 (2020): 1–7, https://doi.org/https://doi.org/10.1016/j.chiabu.2019.104291.

Jonathan, Okpuvwie Ejuvweyere, et al. “Impacts of crime on socio-economic development.” Mediterranean Journal of Social Sciences 12.5 (September 5, 2021): 71–81, https://doi.org/10.36941/mjss-2021-0045.

Simon, June, Ann Luetzow, and Jon R. Conte. “Thirty years of the convention on the rights of the child: Developments in child sexual abuse and exploitation.” Child abuse & neglect 110 (2020): 1–5, https://doi.org/https://doi.org/10.1016/j.chiabu.2020.104399.

Pendergast, Kirra. “Protecting Children Online: Strategies for a Safer Future.” Ubiquity Proceedings 3.1 (June, 2023): 334–39, https://doi.org/10.5334/uproc.105.

Stamatakis, Caroline E., et al. “Sexual violence prevalence and related pregnancy among girls and young women: a multicountry analysis.” Journal of interpersonal violence 37.3-4 (2022): NP2428-NP2441, https://doi.org/10.1177/0886260520936366.

Barbara, Giussy, et al. “Sexual violence against adolescent girls: labeling it to avoid normalization.” Journal of Women’s Health 26.11 (2017): 1146-1149, https://doi.org/10.1089/JWH.2016.6161.

Anubhab Mukherjee, “Silent Suffering : The Unspoken Reality of Male,” International Journal of Research and Review 11, no. August (2024): 613–24, https://doi.org/https://doi.org/10.52403/ijrr.20240866.

Adrial Akbar, “PPATK Temukan Transaksi Rp 114 M Terkait Pornografi Anak Selama 2022,” detikNews, 2022, https://news.detik.com/berita/d-6485840/ppatk-temukan-transaksi-rp-114-m-terkait-pornografi-anak-selama-2022.

Cubitt, Timothy IC, et al. “Understanding the offline criminal behavior of individuals who live stream child sexual abuse.” Journal of interpersonal violence 38.9-10 (2023): 6624-6649, https://doi.org/10.1177/08862605221137712.

Jain, Harsh, et al. “Financial investment recommendation and decentralized account management.” 2020 11th International Conference on Computing, Communication and Networking Technologies (ICCCNT). IEEE, (2020): 1–6, https://doi.org/10.1109/ICCCNT49239.2020.9225326.

Fernando, Zico Junius, et al. “The Role of Neuroprediction and Artificial Intelligence in the Future of Criminal Procedure Support Science: A New Era in Neuroscience and Criminal Justice.” Yuridika 38.3 (2023): 593-620, https://doi.org/10.20473/ydk.v38i3.46104

Widyawati, Anis, et al. “Urgency of the Legal Structure Reformation for Law in Execution of Criminal Sanctions.” Lex Scientia Law Review 6.2 (2022): 327-358, https://doi.org/10.15294/lesrev.v6i2.58131

Nilsson, Johan. “Know your customer: Client captivation and the epistemics of market research.” Marketing Theory 19.2 (2019): 149-168, https://doi.org/10.1177/1470593118787577.

Krist, By Marcel. “Will Financial Institutions Ever Achieve a 100% Compliance with Anti–Money Laundering and Combating the Financing of Terrorism Rules?.” The RegTech Book (2019), https://doi.org/10.1002/9781119362197.CH30.

See, Benedictus Renny, and Ahmadi Miru. “Know Your Customer (KYC) Principles Relates to Bank Confidentiality as an Effort to Prevent Money Laundering Crimes.” JL Pol’y & Globalization 81 (2019): 101, https://doi.org/10.7176/JLPG.

Hasanli, Zamina“FATF Recommendations as A Major Tool for AML,” Scientific Research International Online Scientific Journal 3, no. 4 (2023): 1–23, https://doi.org/10.36719/2789-6919/20/91-93.

Verma, Kavery, et al. “Efficient e-KYC Authentication System: Redefining Customer Verification in Digital Banking.” 2023 9th International Conference on Signal Processing and Communication (ICSC). IEEE (2023): 319–24, https://doi.org/10.1109/ICSC60394.2023.10441596.

Lawton, George. “Biometrics: a new era in security.” Computer 31.08 (1998): 16-18, https://doi.org/10.1109/MC.1998.707612.

Sharma, Preeti, A. Shanker Prakash, and Anjul Malhotra. “Application of Advanced AI Algorithms for Fintech Crime Detection.” 2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT). IEEE, (2024): 1-6 , https://doi.org/10.1109/ICCCNT61001.2024.10725857.

Kingdon, Jason. “AI fights money laundering.” IEEE Intelligent Systems 19.3 (2004): 87-89, https://doi.org/10.1109/MIS.2004.1.

Legg, Philip A., et al. “Automated insider threat detection system using user and role-based profile assessment.” IEEE Systems Journal 11.2 (2015): 503-512., https://doi.org/10.1109/JSYST.2015.2438442.

Alahira, Joshua, et al. “The role of artificial intelligence in enhancing tax compliance and financial regulation.” Finance & Accounting Research Journal 10 (2024): 241–251, https://doi.org/10.51594/FARJ.V6I2.822.

Perlman, Leon, and Nora Gurung. “Focus note: the use of eKYC for customer identity and verification and AML.” Available at SSRN 3370665 (2019): 1–28, https://doi.org/10.2139/SSRN.3370665.

Verma, Kavery, et al. “Efficient e-KYC Authentication System: Redefining Customer Verification in Digital Banking.” 2023 9th International Conference on Signal Processing and Communication (ICSC). IEEE, 2023.

Chakraborty, S., et al. “E-KYC system using blockchain.” International Journal for Research in Applied Science and Engineering Technology 11.7 (2023): 1174-1181, https://doi.org/10.22214/ijraset.2023.54834.

Nair, Vijayanka. “An eye for an I: recording biometrics and reconsidering identity in postcolonial India.” Contemporary South Asia 26.2 (2018): 143-156, https://doi.org/10.1080/09584935.2017.1410102.

Hoofnagle, Chris Jay, et al. “The European Union general data protection regulation: what it is and what it means.” Information & Communications Technology Law 28.1 (2019): 65-98, https://doi.org/10.1080/13600834.2019.1573501.

Perlman, Leon, and Gurung, Nora. “Focus note: the use of eKYC for customer identity and verification and AML.” Available at SSRN 3370665 (2019).

Widyawati, Anis, et al. “The Urgency of Supervision Institutions in Implementing Prisoners’ Rights as an Effort to Restructure Criminal Execution Laws.” Jambura Law Review 7.1 (2025): 127-151. https://doi.org/10.33756/jlr.v7i1.27595

Downloads

Published

13-03-2025

Article ID

19651

How to Cite

“Know Your Customer (KYC) Model: A Legal Reform Strategy to Prevent Abuse of Financial Services in Child Sexual Exploitation Transactions”. 2025. Journal of Law and Legal Reform 6 (1): 239-64. https://doi.org/10.15294/jllr.v6i1.19651.