Data Handling Failures and Identity Theft in Art-Market KYC

Identity documents, bank account proofs, and address confirmations collected during customer due diligence CDD by Art Market Participants AMPs can enable account takeover and payment diversion when they are stored poorly by intermediaries or outsourced KYC vendors. Breaches at third parties demonstrate that weak encryption, shared credentials, and excessive retention periods create durable risk even when front-line checks are strong.

How weak storage leads to identity theft

Unencrypted or cached scans

Storing passport and driver’s licence scans in plaintext or on shared drives allows credential harvesting. The ICO investigation into Ticketmaster’s 2018 breach highlighted how skimming scripts exposed payment and identity data at scale.

Shared support accounts

Helpdesk accounts reused across staff obscure accountability and widen exposure. The UK ICO penalty against British Airways noted the lack of multi-factor authentication on critical systems, a failure that maps directly to vendor-operated KYC portals when access controls are lax.

Excessive retention and shadow copies

Retaining ID files beyond legal limits or allowing vendor systems to create unmanaged backups increases the blast radius of a compromise. ICO guidance on storage limitation and security stresses time-bound retention, which is often overlooked in outsourced document handling.

Consequences for collectors and dealers

Personal risk to collectors

The person who is likely to be most affected by a KYC storage failure is the collector. If a collector's identity is stolen, they may be liable for any financial losses incurred as a result. From experience, the 3rd party vendor will not be held liable, and neither will the art dealer.

Account takeover and payment fraud

Stolen IDs and bank statements enable criminals to open accounts, reroute settlement funds, or authenticate as collectors to release artworks.

Synthetic identities

Combining partial address data with leaked IDs supports creation of convincing synthetic profiles used to launder proceeds through high-value art.

Regulatory exposure

Supervisors treat vendor failings as the firm’s responsibility; enforcement notices frequently cite insufficient oversight of processors and sub-processors.

Controls that reduce KYC storage risk

Segregated, encrypted evidence stores

Keep ID documents, bank proofs, and utility bills in encrypted repositories with customer-level compartmentalisation and no public URLs. Audit every view and download to trace provenance of access.

Minimal exposure during sharing

Provide investigators or counterparties with redacted or time-limited views rather than transferable files. Prevent bulk export by default and watermark any necessary transfers.

Role-based access and MFA

Enforce least-privilege access with mandatory multi-factor authentication for staff and vendors handling identification evidence; disallow shared credentials.

Time-boxed retention with deletion evidence

Apply jurisdiction-specific timers (e.g., five years for UK MLR records) and log deletion events to demonstrate compliance. Avoid retaining vendor backups that extend beyond these timers.

Vendor due diligence and monitoring

Assess KYC vendors against OWASP-style security controls, penetration test results, and data residency commitments; require breach notification and evidence of zero-trust design before onboarding.

Lessons from prior incidents

Credential stuffing against KYC portals

Breaches reported in other sectors show attackers exploiting reused passwords to access verification dashboards. Rate limiting, device fingerprinting, and step-up authentication reduce this vector.

Cloud misconfiguration leaks

Publicly exposed storage buckets holding ID scans remain a common finding in security advisories; routine configuration reviews and private network ingress controls block this path.

Assurance for art clients and customers

Everyone benefits when identification evidence is held under zero-trust principles: compartmentalised storage, minimal human access, and controlled release pathways that prove who viewed the file and when. Dealers and auction houses reduce reputational risk when vendors can evidence encryption at rest, transport security, and validated deletion rather than promising not to share documents. Because Proofenance combines payments tracking, KYC capture, and tightly governed evidence handling, we ensures that identity documents, bank details, and address proofs remain protected while still available for supervisory and audit review.

Written By

Tobin Chew

Tobin Chew

I have been both building payment networks, and implementing them for clients, since 2019. I love seeing technology come together to form a functional product which solves a real problem.