First AML leverages third party data providers to perform verification checks on individuals. 

First AML Verification report consists of a high level summary of the verification checks and then a detailed summary of the verification check results.

This article will explain how to interpret verification report results and how to locate & download an individual's report within the First AML Platform. 


Verification Results

Personal Details

  • Name
  • Date of Birth

Each of these checks will result in either a PASS or a FAIL, based on whether the information provided matches the databases checked. 


Each of these checks will result in either a PASS or FAIL.

First AML will endeavour to electronically verify an individuals address. Once passed, this electronic verification satisfies the Address requirement and a Proof of Address document is not needed.

ID Document 

1. ID Document Validity

This section surfaces the ID data provided by the individual. 

ID Validity assesses whether the document is within its valid date range (PASS) or has expired (FAIL). 

2. Anti-tampering

First AML's third party provider employ a variety of techniques designed to identify fraudulent documents. It checks the internal and external consistency of the identity document provided by the applicant to identify potential discrepancies. The overall result may show clear, caution, consider, or rejected.

  1. RejectedOur service provider can't process the document image, or the document isn't supported for processing. Alternatively, the age of the applicant may be too low (the standard threshold is 16 years old). 
  2. Consider: Our system has detected there could be digital tampering, security features aren't present etc. 
  3. Caution: Our system has flagged elements of the document that don't lead to a clear result (for example, expired document or customer is taking a photo of a scanned document).
  4. Clear: All underlying verifications passed. There are no indications the document is fraudulent.


If you see a rejected, consider, or caution result, you will be presented with information as to why this result has occurred to help you to determine the next step. 

Age validation 

Asserts whether the age calculated from the document's date of the birth data point is greater than or equal the minimum accepted age set at the account level. The default minimum age is 16 years old.

Compromised Document 

Asserts whether the image of the document has been found in our internal database of compromised documents.

Data Validation 

Asserts whether algorithmically validatable elements are correct. If 'Document Expiration' shows a flag, this means that the document has expired. If 'Expiry Date' is flagged, this means that the expiration date has the incorrect format.

Image integrity 

Asserts whether the document was of sufficient quality to verify. 

Visual authenticity 

Asserts whether visual (non-textual) elements are correct given the document type.

Example of Consider:

Example of Rejected:

What to do when you receive a rejected anti-tampering result

When we receive a rejected anti-tampering result in our platform, it means our system hasn't been able to complete the relevant checks to confirm the ID hasn't been tampered with. 

Often, we see rejected results due to the original ID document being damaged or parts of the ID has been cut off in the photo (e.g. the MRZ section on a Passport). 

When this occurs, we will contact your client to ask them to complete our EIV form again and we will provide guidance on how this should happen (e.g. if a driver's licence is damaged, we will request they complete the EIV form with another form of ID). In the event the client cannot provide this we will escalate to the compliance officer.

If the result is "Consider" or "Suspected" the compliance team should review the ID document to see if they're happy to accept the verification. If they are not, they can rework the case to advise of First AML of the next step they would like to take e.g. ask the individual to complete a new form or provide a certified copy of their ID.

If your compliance team accept the ID that has been flagged for anti-tampering we would recommend to add a note in the compliance team notes section for audit purposes.

3. Biometrics (facial recognition)

First AML's third party provider compare the video or photo* provided by the applicant to the face on the document provided. It aims to prove identity document ownership so that only the owner of the identity document can use it to verify their identity and access services. The facial recognition report has an overall result, which is either a clear or a consider. When a consider is generated, the report will present any issues found. 

Depending on the reason, and your risk appetite you may decide to reject the user, or manually review and override the result.

*Individuals (your clients) have the option to provide a self-portrait photo via the First AML EIV form rather than submit a video. This option will appear within the form if the individual spends more than 15 seconds on the video page without interacting with the screen. This photo will be reviewed by our facial recognition technology and appear within the individuals' verification report for your review. 

Face Comparison

Asserts whether the face in the document matches the face in the live photo.

Image integrity

Asserts whether the quality and integrity of the uploaded files were sufficient to perform a face comparison.

Visual Authenticity

Asserts whether the person in the selfie or video is real.

Example of Consider:


  • PEP
  • Sanctions
  • Adverse Media

PEP - A politically exposed person is an individual who has been entrusted with a prominent public function and potentially presents a higher financial risk due to the influence they may hold.

Sanctions - Financial penalties that have been applied by a country or countries against an individual or entity.

Adverse Media - Any negative information on an individual or entity discovered across various sources, i.e. reputable news or other publications linking the individual or entity to involvement in corruption, money-laundering, terrorism/threat financing and other unlawful activities.

Each of these checks will result in either a MATCH (where the individual has triggered 1 or many hits) or NO MATCH (where the individual’s check has returned 0 results).


For each section of the report that is presented, it will include details of the name, date of birth, address and ID document (if applicable) that was provided to First AML. There will be a related status, and the various data sources that were checked in the process. In some cases, our First AML team may need to reach out for further information in order to successfully complete the verification.


The PEP, Sanctions and Adverse media section indicates where there has been a match. Clicking on this will take you to a more detailed report that allows you to further investigate the matches.

Verification History

At the bottom of the report there are two sections; History, and Legacy verifications. The History table will list out all verification reports (new) that have been generated for this individual. The Legacy verifications table will include all those legacy verification reports (prior to the new verifications report) generated for an individual. 

Locate & download the Electronic Verification Report 

To view the Electronic Identity Verification Report in the First AML platform please first click into the individuals profile (through clicking their name from the 'Individuals' Tab) and then navigate to the "Verifications" tab. 

From there you will be able to see the most recent Electronic Identity Verification Report (EIV) run on the individual, as well as their EIV history. 

If you wish to download a copy of an individuals verification report for your internal records, you can do so by clicking the printer icon at the top of the individuals page. Once you click the printer, you will have the option to change the destination, change it to "Print to PDF" and click print.