{"version":"1.0","provider_name":"Compliancely","provider_url":"https:\/\/compliancely.com\/blog","author_name":"admin","author_url":"https:\/\/compliancely.com\/blog\/author\/admin\/","title":"What Is Identity Verification - Compliancely","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"C35c5IxMhZ\"><a href=\"https:\/\/compliancely.com\/blog\/what-is-identity-verification\/\">What Is Identity Verification<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/compliancely.com\/blog\/what-is-identity-verification\/embed\/#?secret=C35c5IxMhZ\" width=\"600\" height=\"338\" title=\"&#8220;What Is Identity Verification&#8221; &#8212; Compliancely\" data-secret=\"C35c5IxMhZ\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/compliancely.com\/blog\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","thumbnail_url":"https:\/\/compliancely.com\/blog\/wp-content\/uploads\/2022\/02\/Identity-Verification-2.png","thumbnail_width":730,"thumbnail_height":400,"description":"In the past, businesses in the financial, banking, lending, and insurance industries got burned for not having proper identity verification processes in place prior to the AML and ATF regulations. However, as technology progressed, so did financial and identity fraud. Identity fraud in particular took various shapes and forms as the years unfolded. \u00a0 Be [&hellip;]"}