Our Vendor said, “No Risk.” The Registry said “Sanctioned.” The Fine: €840K.

A European FinTech onboarded 2,400 corporate customers using third-party KYC data. Every profile came back clean. Every risk score was acceptable. Every compliance box was checked.

During a regulatory audit, the examiner pulled the beneficial ownership records from the official government registry. Eighteen of those profiles didn’t match. Some ownership data was 18 months out of date. One entity had a sanctioned beneficial owner, visible in the government database for over a year.

The FinTech’s defense: “Our data vendor said it was current.”

The regulator’s response: “Your vendor’s problems are your problems.”

The fine: €840,000.

Here’s the part nobody talks about: The vendor’s contract explicitly disclaimed liability for data accuracy. The FinTech was paying for data they couldn’t verify, couldn’t trace to a source, and couldn’t defend in an audit. They just didn’t know it until the examiner showed up.

The Question Your Vendor Hopes You Never Ask

Here’s a test. Call your KYC data provider tomorrow and ask them one question:

“For each registry you cover, what’s the longest gap between an official update and when it appears in your database?”

They won’t answer. Because the answer is: they don’t know.

Only 48.8% of the world’s corporate registries offer publicly available APIs. For the other half, aggregators are scraping websites, waiting for periodic data dumps, or processing bulk downloads on their own schedule. When something breaks, a format change, or an access restriction occurs, they may not notice for weeks.

Real-world data freshness I’ve seen across aggregators:

  • Best case: 24–48 hours (for their priority jurisdictions with direct API access)
  • Typical case: 1–4 weeks (for “less important” registries)
  • Worst case: 3–18 months (when integration breaks and nobody notices)

When your vendor shows “last updated: today,” that timestamp means when you queried their database, not when they last checked the official source.

Article content
Translation: Between a government registry updating a beneficial ownership record and that change appearing in your vendor’s database, there’s a window — days, weeks, sometimes months — where you’re making compliance decisions on stale data and have no way to know it.

The Three Things Aggregated Data Can’t Do (That Regulators Now Require)

During regulatory examinations, the conversation follows a predictable script:

1. “Show me the official source.”

Regulator: “Can you show me the official government registry record for this customer?” You (with aggregator): “I can show you our vendor’s data.” Regulator: “That’s not what I asked.”

2. “When was this last verified?”

Regulator: “When was this beneficial ownership verified against the official source?” You: “When we queried our vendor.” Regulator: “When did your vendor last verify it against the official source?” You: “I… don’t know.” Regulator: [writes finding]

3. “Can you re-verify this right now?”

Regulator: “Can you reproduce this verification against the original source?” You: “I can query our vendor again.” Regulator: “Will it give you the same answer it gave you 14 months ago?” You: “Probably not.” Regulator: “So you can’t reproduce your original verification?”

These aren’t hypotheticals. They occur in every regulatory examination of institutions that rely on aggregated data for KYC. And the examiner already knows the answers before asking.


The Math That Makes “Cheaper” Data the Most Expensive Decision

Aggregators charge €15K–€50K/year. Direct primary-source platforms charge €20K–€80K/year.

The initial reaction: “Aggregated is cheaper.”

The actual math from one compliance failure:

Article content

Their vendor charged €35K/year. They “saved” roughly €30K–€40K annually compared to direct primary-source access.

One compliance failure wiped out 60+ years of “savings.”
Article content

And this was a mid-sized firm with 2,400 customers. Scale this to a large institution with 50,000+ entities and the risk exposure isn’t additive — it’s exponential. More entities, more jurisdictions, more stale records, more regulatory surface area.


What Direct Access Actually Changes

When you query a government registry directly at the moment of verification, three things become true simultaneously:

1. Your audit trail points to an authoritative source — not a commercial database that may or may not reflect reality.

2. Your verification is timestamped and reproducible — you can re-verify at any time, and an examiner can independently confirm your result.

3. You see what the registry says right now — not what it said when your vendor last bothered to check.

This isn’t a technology upgrade. It’s the difference between “our vendor said so” and “the official registry confirms it.” One gets you fined. The other gives you a defensible compliance posture.


Key Takeaways

🔹 Your vendor’s “real-time” data may be 30–90 days old — and you have no way to verify actual freshness per registry

🔹 Regulatory liability cannot be outsourced — when aggregated data is wrong, regulators fine you, not your vendor

🔹 “Our vendor said so” isn’t evidence — examiners require source verification, reproducibility, and data lineage your aggregator can’t provide

🔹 One compliance failure erases decades of “savings” — the €2.42M cost of one incident dwarfs any subscription price difference


The Question Worth Asking

Your vendor contract almost certainly includes a liability disclaimer for data accuracy. Which means you’re paying for data, accepting all the risk if it’s wrong, and trusting a refresh schedule you can’t see or verify.

Have you ever asked your vendor what their actual data freshness is per registry — not “real-time” marketing language, but the actual gap between a government update and when it reaches your database?

If you’ve asked and gotten a real answer, I’d genuinely like to hear it. If you’ve asked and gotten deflection, that might be the answer.

In the next edition, we’ll examine what happens when government registries themselves become unreliable and why multi-source verification is the only defensible approach for cross-border compliance.


Tags

#ComplianceRisk #ThirdPartyRisk #KYC #AML #RegulatoryCompliance #VendorRisk #DataQuality #FinancialServices #ComplianceTech #RiskManagement #RegTech #DataGovernance #AuditTrail #FinTech #GRC


References

  1. Everything You Need to Know about Primary-Source Data for Corporate KYC | Finance Magnates
  2. Automate KYC & AML Compliance using Primary Source Data | NICE Actimize
  3. Using Company Registry Data For KYC Data Enrichment (2025 Guide) — Kyckr
  4. Managing multi-jurisdictional AML compliance at scale 2025 | RelyComply
  5. Public KYC Data Sources | EC360 | Encompass Corporation