Skip to content

What Is Know Your Customer Software and What Are the Legal Requirements?

Protecting your business is essential, but it can be hard to know where to find protection and what you need protection from. Unwanted calls can present a threat to businesses and brands, so enlisting the proper protection is essential. Know Your Customer (KYC) software is a great way to protect your business and reduce robocalls.

In this article, we cover:

Lets dive in and discuss Know Your Customer (KYC) software further.

Know Your Customer Software

Businesses and individuals constantly receive robocalls. The FCC has made fighting this a priority, and pushed that requirements down to telecom providers throughout the USA to enforce robocall mitigation.

Robocall mitigation is now required by all telecom providers in the USA, per the FCC. Know Your Customer (KYC) software uses a number of techniques to help assure you are ahead of the robocallers… and safe from FCC challenges as well.

Know Your Customer software benefits communication providers by protecting them from robocalls – and the FCC — but is only one part of the solution.

Know Your Customer solutions alone does not entirely protect your network from robocallers and the FCC. Just because you Know Your Customer doesn’t meant that you know what they will do next with a telephone number. Therefore, more must be done — particularly to assure you’re following a due diligence process that meets the FCC legal requirements for telecom providers.


You may know your customer, but you also have to know that calls are originating and arriving from the number they claim to be from. That’s done through Authentication. Some robocall mitigation entities — YouMailPS included — use STIR/SHAKEN Attestation, which allows for greater analysis and authentication of telephone calls.

(STIR/SHAKEN, simply put, uses secure digital certificates to ensure numbers are accurate and not spoofed. STIR/SHAKEN analytics are facilitated through Attestation Software.)

Combining Authentication through STIR/SHAKEN attestation software with rigorous KYC processes can greatly increase the capture and block rates of unlawful robocalls. Even so, more can be done.

Monitoring / Audio Analytics

A robocall mitigation method that is often overlooked – but is key to robocall mitigation – is content-based audio analytics.

Analytics Engines (AE) help provide number scoring and categorization of content. There are two main forms of analytics: event-based analytics and content-based analytics.

YouMailPS provides content-based analytics through the use of audio information from billions of data points from our consumer protection services, as well as more than 10 years experience and patented detection technology.

So instead of relying on inferences gained from the signaling layer (like SIP messages), a content-based approach is definitive, and dramatically reduces false positives and false negatives.

YouMail Protective Services

All Analytics Engines rely upon deterministic data, such as identification of malformed numbers, non-NANPA numbers, or numbers that do not pass the allocation test, and may also rely upon crowd-sourced data. But this can improperly skew results, such as calls involving telemarketing or debt collection.

YouMailPS instead leverages AI, machine learning and content-based analytics to determine normal calls vs. robocalls, legal/wanted calls vs. unwanted/illegal robocalls, and algorithmically score telephone numbers. This information is used by communication service providers, enterprise, and government segments for unwanted robocall mitigation, enforcement, and even business optimization.

No other organization other than YouMailPS has as much evidential proof of what is actually occurring with unwanted robocall campaigns from bad actors, who often rotate through telephone numbers very quickly making it nearly impossible to catch illegal calls based on event-based analytics alone.

Safe voice communications require: (1) Know Your Customer, (2) Authentication, and (3) Monitoring. It's often that last piece that is overlooked or performed sub-optimally, putting your organization at risk with the FCC, and your clients.

To learn more about Know Your Customer software – as well as authentication and monitoring – check out our free resources at >


Download Whitepaper