{"id":4973,"date":"2026-02-18T11:38:52","date_gmt":"2026-02-18T06:08:52","guid":{"rendered":"https:\/\/gridlines.io\/blogs\/?p=4973"},"modified":"2026-02-18T11:38:52","modified_gmt":"2026-02-18T06:08:52","slug":"difference-between-kyc-ekyc-and-video-kyc","status":"publish","type":"post","link":"https:\/\/gridlines.io\/blogs\/difference-between-kyc-ekyc-and-video-kyc\/","title":{"rendered":"Difference Between KYC, eKYC, and Video KYC"},"content":{"rendered":"<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_62 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title \" >Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><ul class='ez-toc-list-level-2' ><li class='ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/gridlines.io\/blogs\/difference-between-kyc-ekyc-and-video-kyc\/#Why_KYC_Exists\" title=\"Why KYC Exists\">Why KYC Exists<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-1'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/gridlines.io\/blogs\/difference-between-kyc-ekyc-and-video-kyc\/#Traditional_KYC_The_Physical_Approach\" title=\"Traditional KYC: The Physical Approach\">Traditional KYC: The Physical Approach<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-1'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/gridlines.io\/blogs\/difference-between-kyc-ekyc-and-video-kyc\/#eKYC_Digital_Identity_Validation\" title=\"eKYC: Digital Identity Validation\">eKYC: Digital Identity Validation<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-1'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/gridlines.io\/blogs\/difference-between-kyc-ekyc-and-video-kyc\/#Video_KYC_Adding_Live_Verification\" title=\"Video KYC: Adding Live Verification\">Video KYC: Adding Live Verification<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-1'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/gridlines.io\/blogs\/difference-between-kyc-ekyc-and-video-kyc\/#Side-by-Side_Comparison\" title=\"Side-by-Side Comparison\">Side-by-Side Comparison<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-1'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/gridlines.io\/blogs\/difference-between-kyc-ekyc-and-video-kyc\/#Choosing_the_Right_Model\" title=\"Choosing the Right Model\">Choosing the Right Model<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-1'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/gridlines.io\/blogs\/difference-between-kyc-ekyc-and-video-kyc\/#The_Compliance_Angle\" title=\"The Compliance Angle\">The Compliance Angle<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-1'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/gridlines.io\/blogs\/difference-between-kyc-ekyc-and-video-kyc\/#The_Fraud_Perspective\" title=\"The Fraud Perspective\">The Fraud Perspective<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-1'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/gridlines.io\/blogs\/difference-between-kyc-ekyc-and-video-kyc\/#Infrastructure_and_Operational_Considerations\" title=\"Infrastructure and Operational Considerations\">Infrastructure and Operational Considerations<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-1'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/gridlines.io\/blogs\/difference-between-kyc-ekyc-and-video-kyc\/#The_Strategic_View\" title=\"The Strategic View\">The Strategic View<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-1'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/gridlines.io\/blogs\/difference-between-kyc-ekyc-and-video-kyc\/#Closing_Thought\" title=\"Closing Thought\">Closing Thought<\/a><\/li><\/ul><\/nav><\/div>\n\n<p><em>Same regulatory objective. Three very different execution models.<\/em><\/p>\n\n\n\n<p>If you work in fintech, lending, NBFCs, payments, or any regulated digital business, you\u2019ve probably heard these terms used almost interchangeably: KYC, eKYC, Video KYC.<\/p>\n\n\n\n<p>They\u2019re related. But they are not the same.<\/p>\n\n\n\n<p>And the difference isn\u2019t just technical. It affects onboarding speed, fraud exposure, regulatory defensibility, infrastructure cost, and overall customer experience.<\/p>\n\n\n\n<p>To understand how they differ, you have to begin with why KYC exists in the first place.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Why_KYC_Exists\"><\/span><strong>Why KYC Exists<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p><a href=\"https:\/\/gridlines.io\/blogs\/high-risk-customer-kyc-what-changes\/\">KYC<\/a> \u2014 Know Your Customer \u2014 is a regulatory safeguard. It ensures that financial institutions verify the identity of customers before establishing a relationship. The goal is to prevent <a href=\"https:\/\/ongrid.in\/blogs\/synthetic-identity-fraud-protecting-workplaces-from-invisible-risks\/\">identity fraud<\/a>, money laundering, financial misuse, and systemic risk.<\/p>\n\n\n\n<p>In India, regulated entities follow RBI-prescribed frameworks for customer identification. Over time, as onboarding shifted from branches to mobile apps, the verification methods evolved.<\/p>\n\n\n\n<p>The objective never changed.<br>Only the execution model did.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Traditional_KYC_The_Physical_Approach\"><\/span><strong>Traditional KYC: The Physical Approach<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h1>\n\n\n\n<p>Traditional KYC is the original in-person verification model.<\/p>\n\n\n\n<p>It involves submitting physical copies of identity and address proof, signing forms, and often completing in-person verification at a branch or through a field representative.<\/p>\n\n\n\n<p>For years, this was the default approach in banking.<\/p>\n\n\n\n<p>Its biggest strength is tangible assurance. A verification officer inspects original documents physically. Face-to-face interaction reduces impersonation risk. Signatures are collected directly.<\/p>\n\n\n\n<p>But it is slow. It depends heavily on operational coordination. It does not scale easily in a digital-first ecosystem.<\/p>\n\n\n\n<p>For high-growth fintech platforms, physical KYC creates friction that digital businesses struggle to accommodate.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"eKYC_Digital_Identity_Validation\"><\/span><strong>eKYC: Digital Identity Validation<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h1>\n\n\n\n<p>eKYC \u2014 electronic Know Your Customer \u2014 eliminates the need for physical interaction.<\/p>\n\n\n\n<p>Identity verification happens digitally through structured database authentication and API integrations. Aadhaar-based OTP or biometric authentication played a major role in shaping early eKYC flows in India, alongside PAN validation and other database checks.<\/p>\n\n\n\n<p>The defining characteristic of eKYC is this:<br>No in-person interaction is required.<\/p>\n\n\n\n<p>Verification happens electronically, and identity attributes are validated against trusted data sources.<\/p>\n\n\n\n<p>For fintech companies, this dramatically accelerated onboarding. Customers could complete verification in minutes instead of days. Data flowed directly into systems in structured form.<\/p>\n\n\n\n<p>However, assurance depends on how strong the digital controls are. eKYC validates data, but it may not always validate the physical presence of the person during the transaction.<\/p>\n\n\n\n<p>That distinction matters in higher-risk use cases.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Video_KYC_Adding_Live_Verification\"><\/span><strong>Video KYC: Adding Live Verification<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h1>\n\n\n\n<p>Video KYC \u2014 formally recognized by RBI as the Video-based Customer Identification Process \u2014 combines digital onboarding with live visual verification.<\/p>\n\n\n\n<p>In this model, a verification officer conducts a real-time video interaction with the customer. The customer displays original documents during the call. The system performs liveness checks, captures facial images, records the session, and geo-tags the interaction.<\/p>\n\n\n\n<p>Video KYC replicates key elements of in-person verification \u2014 without requiring a branch visit.<\/p>\n\n\n\n<p>Unlike standard eKYC, which validates information electronically, Video KYC confirms that a real individual is present and interacting live.<\/p>\n\n\n\n<p>For regulated financial institutions, this significantly improves compliance defensibility.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Side-by-Side_Comparison\"><\/span><strong>Side-by-Side Comparison<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h1>\n\n\n\n<p>Here\u2019s a clear view of how the three models differ across practical dimensions:<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><td><strong>Parameter<\/strong><\/td><td><strong>Traditional KYC<\/strong><\/td><td><strong>eKYC<\/strong><\/td><td><strong>Video KYC<\/strong><\/td><\/tr><tr><td>Interaction Type<\/td><td>Physical, in-person<\/td><td>Fully digital<\/td><td>Live remote video<\/td><\/tr><tr><td>Document Handling<\/td><td>Physical copies<\/td><td>Digital upload or database validation<\/td><td>Original document shown on video<\/td><\/tr><tr><td>Human Involvement<\/td><td>Physical officer verification<\/td><td>Minimal or none<\/td><td>Real-time verification officer<\/td><\/tr><tr><td>Speed<\/td><td>Slow to moderate<\/td><td>Fast<\/td><td>Moderate<\/td><\/tr><tr><td>Scalability<\/td><td>Limited by physical infrastructure<\/td><td>Highly scalable<\/td><td>Scalable with trained teams<\/td><\/tr><tr><td>Fraud Resistance<\/td><td>Strong against remote impersonation<\/td><td>Depends on digital controls<\/td><td>Strong against impersonation<\/td><\/tr><tr><td>Regulatory Assurance<\/td><td>High<\/td><td>Moderate to high (depending on flow)<\/td><td>High, audit-recorded<\/td><\/tr><tr><td>Audit Trail<\/td><td>Paper-based documentation<\/td><td>Digital logs<\/td><td>Recorded video, geo-tag, logs<\/td><\/tr><tr><td>Cost Structure<\/td><td>Operationally heavy<\/td><td>Infrastructure-driven<\/td><td>Infrastructure + manpower<\/td><\/tr><tr><td>Ideal For<\/td><td>Branch banking, physical onboarding<\/td><td>Low-risk digital onboarding<\/td><td>Regulated, higher-risk onboarding<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h1 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Choosing_the_Right_Model\"><\/span><strong>Choosing the Right Model<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h1>\n\n\n\n<p>These models are not competitors. They are verification tools suited to different risk categories.<\/p>\n\n\n\n<p>Traditional KYC makes sense in branch-heavy ecosystems or conservative regulatory environments.<\/p>\n\n\n\n<p>eKYC is ideal for high-volume, low-to-moderate risk onboarding where speed is critical and exposure is controlled.<\/p>\n\n\n\n<p>Video KYC works well for regulated financial products, higher-ticket lending, investment platforms, and institutions that require stronger audit defensibility.<\/p>\n\n\n\n<p>The decision should be guided by risk tier, regulatory category, and product sensitivity \u2014 not just cost or convenience.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"The_Compliance_Angle\"><\/span><strong>The Compliance Angle<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h1>\n\n\n\n<p>From a compliance standpoint, the quality of verification evidence differs significantly.<\/p>\n\n\n\n<p>Traditional KYC provides physical documentation.<\/p>\n\n\n\n<p>eKYC provides authentication logs and digital validation records.<\/p>\n\n\n\n<p>Video KYC provides recorded audio-visual evidence, geo-location data, officer verification logs, and timestamped sessions.<\/p>\n\n\n\n<p>When auditors assess onboarding processes, the strength of documentation matters. In higher-risk categories, Video KYC often provides stronger defensibility compared to pure digital flows.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"The_Fraud_Perspective\"><\/span><strong>The Fraud Perspective<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h1>\n\n\n\n<p>Fraud patterns evolve with technology.<\/p>\n\n\n\n<p>Traditional KYC reduces remote impersonation but may face risks related to document forgery or agent-level inconsistencies.<\/p>\n\n\n\n<p>eKYC reduces manual errors but requires strong fraud detection around OTP misuse, SIM swaps, and identity theft.<\/p>\n\n\n\n<p>Video KYC introduces a live verification barrier that makes impersonation significantly harder \u2014 but effectiveness depends on process discipline and system robustness.<\/p>\n\n\n\n<p>Technology alone doesn\u2019t eliminate risk. Architecture and controls determine outcomes.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Infrastructure_and_Operational_Considerations\"><\/span><strong>Infrastructure and Operational Considerations<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h1>\n\n\n\n<p>For product and risk teams, the choice between these models also affects infrastructure design.<\/p>\n\n\n\n<p>Traditional KYC requires physical network capability.<\/p>\n\n\n\n<p>eKYC requires secure API integrations and digital validation logic.<\/p>\n\n\n\n<p>Video KYC requires real-time video infrastructure, trained officers, secure storage for recorded sessions, and compliance logging systems.<\/p>\n\n\n\n<p>Each approach has operational implications. The right model balances onboarding efficiency with regulatory and fraud exposure.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"The_Strategic_View\"><\/span><strong>The Strategic View<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h1>\n\n\n\n<p>In today\u2019s digital financial ecosystem, onboarding is not just about reducing friction. It\u2019s about building defensible systems.<\/p>\n\n\n\n<p>KYC, eKYC, and Video KYC represent three different assurance levels within the same regulatory objective.<\/p>\n\n\n\n<p>Understanding their differences allows compliance, product, and risk teams to design onboarding journeys that are proportional to risk \u2014 fast where possible, robust where necessary.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Closing_Thought\"><\/span><strong>Closing Thought<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h1>\n\n\n\n<p>All three models answer the same fundamental question:<\/p>\n\n\n\n<p>Is this customer genuine?<\/p>\n\n\n\n<p>Traditional KYC answers it physically.<br>eKYC answers it digitally.<br>Video KYC answers it visually and digitally.<\/p>\n\n\n\n<p>The right choice depends on your regulatory obligations, fraud risk tolerance, and operational maturity.<\/p>\n\n\n\n<p>In regulated ecosystems, identity verification is not a checkbox. It is infrastructure. And choosing the right model determines how resilient that infrastructure truly is.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Same regulatory objective. Three very different execution models. If you work in fintech, lending, NBFCs, payments, or any regulated digital&#8230; <\/p>\n","protected":false},"author":8,"featured_media":4974,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[54],"tags":[],"class_list":["post-4973","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-digital-onboarding"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Difference Between KYC, eKYC, and Video KYC<\/title>\n<meta name=\"description\" content=\"Understand the difference between KYC, eKYC, and Video KYC. Compare speed, compliance, fraud risk, and use cases clearly.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/gridlines.io\/blogs\/difference-between-kyc-ekyc-and-video-kyc\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Difference Between KYC, eKYC, and Video KYC\" \/>\n<meta property=\"og:description\" content=\"Understand the difference between KYC, eKYC, and Video KYC. Compare speed, compliance, fraud risk, and use cases clearly.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/gridlines.io\/blogs\/difference-between-kyc-ekyc-and-video-kyc\/\" \/>\n<meta property=\"og:site_name\" content=\"Gridlines Blogs\" \/>\n<meta property=\"article:published_time\" content=\"2026-02-18T06:08:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/gridlines.io\/blogs\/wp-content\/uploads\/2026\/02\/Difference-Between-KYC-eKYC-and-Video-KYC___.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"vivek agarwal\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"vivek agarwal\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/gridlines.io\/blogs\/difference-between-kyc-ekyc-and-video-kyc\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/gridlines.io\/blogs\/difference-between-kyc-ekyc-and-video-kyc\/\"},\"author\":{\"name\":\"vivek agarwal\",\"@id\":\"https:\/\/gridlines.io\/blogs\/#\/schema\/person\/6e07f466307f41ade0e80191b4401328\"},\"headline\":\"Difference Between KYC, eKYC, and Video KYC\",\"datePublished\":\"2026-02-18T06:08:52+00:00\",\"dateModified\":\"2026-02-18T06:08:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/gridlines.io\/blogs\/difference-between-kyc-ekyc-and-video-kyc\/\"},\"wordCount\":1037,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/gridlines.io\/blogs\/#organization\"},\"articleSection\":[\"Digital Onboarding\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/gridlines.io\/blogs\/difference-between-kyc-ekyc-and-video-kyc\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/gridlines.io\/blogs\/difference-between-kyc-ekyc-and-video-kyc\/\",\"url\":\"https:\/\/gridlines.io\/blogs\/difference-between-kyc-ekyc-and-video-kyc\/\",\"name\":\"Difference Between KYC, eKYC, and Video KYC\",\"isPartOf\":{\"@id\":\"https:\/\/gridlines.io\/blogs\/#website\"},\"datePublished\":\"2026-02-18T06:08:52+00:00\",\"dateModified\":\"2026-02-18T06:08:52+00:00\",\"description\":\"Understand the difference between KYC, eKYC, and Video KYC. Compare speed, compliance, fraud risk, and use cases clearly.\",\"breadcrumb\":{\"@id\":\"https:\/\/gridlines.io\/blogs\/difference-between-kyc-ekyc-and-video-kyc\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/gridlines.io\/blogs\/difference-between-kyc-ekyc-and-video-kyc\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/gridlines.io\/blogs\/difference-between-kyc-ekyc-and-video-kyc\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/gridlines.io\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Difference Between KYC, eKYC, and Video KYC\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/gridlines.io\/blogs\/#website\",\"url\":\"https:\/\/gridlines.io\/blogs\/\",\"name\":\"Gridlines\",\"description\":\"Explore Ideas, Insights and Updates\",\"publisher\":{\"@id\":\"https:\/\/gridlines.io\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/gridlines.io\/blogs\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/gridlines.io\/blogs\/#organization\",\"name\":\"Gridlines\",\"url\":\"https:\/\/gridlines.io\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/gridlines.io\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/gridlines.io\/blogs\/wp-content\/uploads\/2024\/01\/Logo-Gridlines.png\",\"contentUrl\":\"https:\/\/gridlines.io\/blogs\/wp-content\/uploads\/2024\/01\/Logo-Gridlines.png\",\"width\":384,\"height\":98,\"caption\":\"Gridlines\"},\"image\":{\"@id\":\"https:\/\/gridlines.io\/blogs\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/gridlines.io\/blogs\/#\/schema\/person\/6e07f466307f41ade0e80191b4401328\",\"name\":\"vivek agarwal\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/gridlines.io\/blogs\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/bf5eb00d28c58331e3b395a731ac8fd6bbe8d3ce3267d279bcdba3e62cd7f1fd?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/bf5eb00d28c58331e3b395a731ac8fd6bbe8d3ce3267d279bcdba3e62cd7f1fd?s=96&d=mm&r=g\",\"caption\":\"vivek agarwal\"},\"url\":\"https:\/\/gridlines.io\/blogs\/author\/vivek-agarwal\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Difference Between KYC, eKYC, and Video KYC","description":"Understand the difference between KYC, eKYC, and Video KYC. Compare speed, compliance, fraud risk, and use cases clearly.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/gridlines.io\/blogs\/difference-between-kyc-ekyc-and-video-kyc\/","og_locale":"en_US","og_type":"article","og_title":"Difference Between KYC, eKYC, and Video KYC","og_description":"Understand the difference between KYC, eKYC, and Video KYC. Compare speed, compliance, fraud risk, and use cases clearly.","og_url":"https:\/\/gridlines.io\/blogs\/difference-between-kyc-ekyc-and-video-kyc\/","og_site_name":"Gridlines Blogs","article_published_time":"2026-02-18T06:08:52+00:00","og_image":[{"width":1600,"height":900,"url":"https:\/\/gridlines.io\/blogs\/wp-content\/uploads\/2026\/02\/Difference-Between-KYC-eKYC-and-Video-KYC___.jpg","type":"image\/jpeg"}],"author":"vivek agarwal","twitter_card":"summary_large_image","twitter_misc":{"Written by":"vivek agarwal","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/gridlines.io\/blogs\/difference-between-kyc-ekyc-and-video-kyc\/#article","isPartOf":{"@id":"https:\/\/gridlines.io\/blogs\/difference-between-kyc-ekyc-and-video-kyc\/"},"author":{"name":"vivek agarwal","@id":"https:\/\/gridlines.io\/blogs\/#\/schema\/person\/6e07f466307f41ade0e80191b4401328"},"headline":"Difference Between KYC, eKYC, and Video KYC","datePublished":"2026-02-18T06:08:52+00:00","dateModified":"2026-02-18T06:08:52+00:00","mainEntityOfPage":{"@id":"https:\/\/gridlines.io\/blogs\/difference-between-kyc-ekyc-and-video-kyc\/"},"wordCount":1037,"commentCount":0,"publisher":{"@id":"https:\/\/gridlines.io\/blogs\/#organization"},"articleSection":["Digital Onboarding"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/gridlines.io\/blogs\/difference-between-kyc-ekyc-and-video-kyc\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/gridlines.io\/blogs\/difference-between-kyc-ekyc-and-video-kyc\/","url":"https:\/\/gridlines.io\/blogs\/difference-between-kyc-ekyc-and-video-kyc\/","name":"Difference Between KYC, eKYC, and Video KYC","isPartOf":{"@id":"https:\/\/gridlines.io\/blogs\/#website"},"datePublished":"2026-02-18T06:08:52+00:00","dateModified":"2026-02-18T06:08:52+00:00","description":"Understand the difference between KYC, eKYC, and Video KYC. Compare speed, compliance, fraud risk, and use cases clearly.","breadcrumb":{"@id":"https:\/\/gridlines.io\/blogs\/difference-between-kyc-ekyc-and-video-kyc\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/gridlines.io\/blogs\/difference-between-kyc-ekyc-and-video-kyc\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/gridlines.io\/blogs\/difference-between-kyc-ekyc-and-video-kyc\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/gridlines.io\/blogs\/"},{"@type":"ListItem","position":2,"name":"Difference Between KYC, eKYC, and Video KYC"}]},{"@type":"WebSite","@id":"https:\/\/gridlines.io\/blogs\/#website","url":"https:\/\/gridlines.io\/blogs\/","name":"Gridlines","description":"Explore Ideas, Insights and Updates","publisher":{"@id":"https:\/\/gridlines.io\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/gridlines.io\/blogs\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/gridlines.io\/blogs\/#organization","name":"Gridlines","url":"https:\/\/gridlines.io\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/gridlines.io\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/gridlines.io\/blogs\/wp-content\/uploads\/2024\/01\/Logo-Gridlines.png","contentUrl":"https:\/\/gridlines.io\/blogs\/wp-content\/uploads\/2024\/01\/Logo-Gridlines.png","width":384,"height":98,"caption":"Gridlines"},"image":{"@id":"https:\/\/gridlines.io\/blogs\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/gridlines.io\/blogs\/#\/schema\/person\/6e07f466307f41ade0e80191b4401328","name":"vivek agarwal","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/gridlines.io\/blogs\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/bf5eb00d28c58331e3b395a731ac8fd6bbe8d3ce3267d279bcdba3e62cd7f1fd?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/bf5eb00d28c58331e3b395a731ac8fd6bbe8d3ce3267d279bcdba3e62cd7f1fd?s=96&d=mm&r=g","caption":"vivek agarwal"},"url":"https:\/\/gridlines.io\/blogs\/author\/vivek-agarwal\/"}]}},"_links":{"self":[{"href":"https:\/\/gridlines.io\/blogs\/wp-json\/wp\/v2\/posts\/4973","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gridlines.io\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gridlines.io\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gridlines.io\/blogs\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/gridlines.io\/blogs\/wp-json\/wp\/v2\/comments?post=4973"}],"version-history":[{"count":1,"href":"https:\/\/gridlines.io\/blogs\/wp-json\/wp\/v2\/posts\/4973\/revisions"}],"predecessor-version":[{"id":4975,"href":"https:\/\/gridlines.io\/blogs\/wp-json\/wp\/v2\/posts\/4973\/revisions\/4975"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gridlines.io\/blogs\/wp-json\/wp\/v2\/media\/4974"}],"wp:attachment":[{"href":"https:\/\/gridlines.io\/blogs\/wp-json\/wp\/v2\/media?parent=4973"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gridlines.io\/blogs\/wp-json\/wp\/v2\/categories?post=4973"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gridlines.io\/blogs\/wp-json\/wp\/v2\/tags?post=4973"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}