Infographics
Netheos brings its expertise through fun and illustrated infographics. We decipher the latest news in digital underwriting, highlighting numerous sourced and quantified information.
Online subscription: the 5 commandments
Uses are changing: prospects and customers now prefer to do things remotely. More practical and faster, they offer many advantages. Discover in this infographic the
Understanding eIDAS
Adopted in 2014, the eIDAS (Electronic IDentification And Trust Services) is the regulation covering electronic identification and trust services. It aims toincrease confidence in electronic
Understand the consequences of PSD2 on electronic signature and SMS OTP
The OTP SMS (One-Time-Password) is the unique and ephemeral code that is sent to you by phone to verify your identity during a sensitive transaction.
Understanding the dematerialization of the tenant file
As a professional, the dematerialization of rental files allows your customers to benefit from an automated support to build up their file remotely, in full
6 additional vigilance measures when a relationship is entered into at a distance
Article L.561-2 of the Monetary and Financial Code obliges professionals to put in place all procedures and measures for the purpose of customer identification. Discover
Automated investigation and control of the tax notice
As a social landlord, you are required to conduct regular surveys of your tenants (SLS/OPS). Discover in infographic how to conduct these surveys with simplicity
5 levels of control to stop identity fraud on the Internet
Identity fraud is on the rise, partly due to the increase in remote and dematerialized procedures: fraudsters are industrializing their fraud techniques, controls are more
Automate your remediation campaign in 3 steps
As a financial institution, you are subject to obligations to verify the identity of your customers (KYC) throughout the business relationship. Discover how to restore
Secure remote signature identified by electronic registered mail
Signing remotely with this level of security and legal recognition has never been easier. How does an electronic signature based on an identification by an