{"id":7613,"date":"2023-09-22T11:50:48","date_gmt":"2023-09-22T19:50:48","guid":{"rendered":"https:\/\/live-cometml.pantheonsite.io\/?p=7613"},"modified":"2025-04-24T17:13:54","modified_gmt":"2025-04-24T17:13:54","slug":"nlp-techniques-used-for-compliance-checks","status":"publish","type":"post","link":"https:\/\/www.comet.com\/site\/blog\/nlp-techniques-used-for-compliance-checks\/","title":{"rendered":"NLP techniques used for compliance checks"},"content":{"rendered":"\n<link rel=\"canonical\" href=\"https:\/\/www.comet.com\/site\/blog\/nlp-techniques-used-for-compliance-checks\">\n\n\n\n<div class=\"fh fi fj fk fl\">\n<div class=\"ab ca\">\n<div class=\"ch bg et eu ev ew\">\n<p id=\"66fd\" class=\"pw-post-body-paragraph lt lu fo be b lv lw lx ly lz ma mb mc md me mf mg mh mi mj mk ml mm mn mo mp fh bj\" data-selectable-paragraph=\"\">AI-powered applications and solutions have become a major catalyst when it comes to compliance checks, particularly in NLP. The aim of this article is to go through NLP techniques and how you can apply them to your company&#8217;s compliance process to make it easier and more efficient.<\/p>\n<p id=\"b336\" class=\"pw-post-body-paragraph lt lu fo be b lv lw lx ly lz ma mb mc md me mf mg mh mi mj mk ml mm mn mo mp fh bj\" data-selectable-paragraph=\"\">We have all had to adapt to the impacts of Covid-19 causing more and more companies to realize the importance and impact of digitalization. One of the significant issues that compliance faced during the pandemic was the lack of accuracy and quality as people were working from home.<\/p>\n<p id=\"c50f\" class=\"pw-post-body-paragraph lt lu fo be b lv lw lx ly lz ma mb mc md me mf mg mh mi mj mk ml mm mn mo mp fh bj\" data-selectable-paragraph=\"\">Let\u2019s first quickly go over some definitions for the point of this article:<\/p>\n<p id=\"c86d\" class=\"pw-post-body-paragraph lt lu fo be b lv lw lx ly lz ma mb mc md me mf mg mh mi mj mk ml mm mn mo mp fh bj\" data-selectable-paragraph=\"\"><strong class=\"be mq\">Natural Language Processing (NLP)<\/strong> is the ability of a computer\/software\/application to be able to detect and understand human language through speech and text, just the way we humans can.<\/p>\n<p id=\"f4ce\" class=\"pw-post-body-paragraph lt lu fo be b lv lw lx ly lz ma mb mc md me mf mg mh mi mj mk ml mm mn mo mp fh bj\" data-selectable-paragraph=\"\"><strong class=\"be mq\">Compliance checks<\/strong> are the process of focused reviews and analysis to check whether the controls put in place and the outputs produced to meet the security requirements that have been implemented into the security and risk treatment plans.<\/p>\n<h1 id=\"a611\" class=\"mr ms fo be mt mu mv mw mx my mz na nb nc nd ne nf ng nh ni nj nk nl nm nn no bj\" data-selectable-paragraph=\"\">Why are compliance checks important?<\/h1>\n<p id=\"791a\" class=\"pw-post-body-paragraph lt lu fo be b lv np lx ly lz nq mb mc md nr mf mg mh ns mj mk ml nt mn mo mp fh bj\" data-selectable-paragraph=\"\">Having the right compliance checks put in place can save a lot of companies time and money. If your company does not follow the correct protocols, they are at a high risk of fines and penalties.<\/p>\n<p id=\"61c1\" class=\"pw-post-body-paragraph lt lu fo be b lv lw lx ly lz ma mb mc md me mf mg mh mi mj mk ml mm mn mo mp fh bj\" data-selectable-paragraph=\"\">Let\u2019s take the banking industry for example. The banking industry uses the Know Your Customer (KYC) process to help with compliance checks. KYC is a set of standards that are designed to protect financial institutions against money laundering, fraud, and other acts of corruption such as terrorist financing. The KYC process is used to perform mandatory checks in identifying and verifying the client\u2019s identity.<\/p>\n<p id=\"014d\" class=\"pw-post-body-paragraph lt lu fo be b lv lw lx ly lz ma mb mc md me mf mg mh mi mj mk ml mm mn mo mp fh bj\" data-selectable-paragraph=\"\">We\u2019ve all seen the rise in cyberattacks and fraudsters, some may have even asked you to help out. Therefore, the fight to ensure that compliance checks are done correctly is more important than ever.<\/p>\n<p id=\"5308\" class=\"pw-post-body-paragraph lt lu fo be b lv lw lx ly lz ma mb mc md me mf mg mh mi mj mk ml mm mn mo mp fh bj\" data-selectable-paragraph=\"\">According to the <a class=\"af nu\" href=\"https:\/\/www.theguardian.com\/business\/2021\/dec\/03\/uk-government-covid-loan-watchdog-national-audit-office\" target=\"_blank\" rel=\"noopener ugc nofollow\">National Audit Office in the UK, the Government\u2019s \u00a347bn emergency lending scheme<\/a> abused many KYC regulations due to a lack of compliance checks such as identity checks. Due to this, it was estimated that around 11% of loans were fraudulent.<\/p>\n<h1 id=\"6756\" class=\"mr ms fo be mt mu mv mw mx my mz na nb nc nd ne nf ng nh ni nj nk nl nm nn no bj\" data-selectable-paragraph=\"\">Current issues with traditional compliance management<\/h1>\n<p id=\"36b8\" class=\"pw-post-body-paragraph lt lu fo be b lv np lx ly lz nq mb mc md nr mf mg mh ns mj mk ml nt mn mo mp fh bj\" data-selectable-paragraph=\"\">Compliance management comes with its own difficulties:<\/p>\n<ul class=\"\">\n<li id=\"87fe\" class=\"lt lu fo be b lv lw lx ly lz ma mb mc md nv mf mg mh nw mj mk ml nx mn mo mp ny nz oa bj\" data-selectable-paragraph=\"\"><strong class=\"be mq\">Environments:<\/strong> Depending on your environment, systems and infrastructure can lose their management between different teams. Once this happens, you naturally lose control and raise the liability of risks and vulnerabilities.<\/li>\n<li id=\"25f8\" class=\"lt lu fo be b lv ob lx ly lz oc mb mc md od mf mg mh oe mj mk ml of mn mo mp ny nz oa bj\" data-selectable-paragraph=\"\"><strong class=\"be mq\">Teams:<\/strong> The bigger your team, the bigger the infrastructure you use causing your environment to be bigger. This also causes a natural loss of control and management.<\/li>\n<li id=\"7800\" class=\"lt lu fo be b lv ob lx ly lz oc mb mc md od mf mg mh oe mj mk ml of mn mo mp ny nz oa bj\" data-selectable-paragraph=\"\"><strong class=\"be mq\">Security:<\/strong> As mentioned prior, an increase in threats leads to a lack of security due to constant threats. Due to this, an organization will have to constantly make changes to compliance checks which is a highly manual process.<\/li>\n<\/ul>\n<h1 id=\"56d2\" class=\"mr ms fo be mt mu mv mw mx my mz na nb nc nd ne nf ng nh ni nj nk nl nm nn no bj\" data-selectable-paragraph=\"\">NLP: Intelligent Process Automation<\/h1>\n<p id=\"fdce\" class=\"pw-post-body-paragraph lt lu fo be b lv np lx ly lz nq mb mc md nr mf mg mh ns mj mk ml nt mn mo mp fh bj\" data-selectable-paragraph=\"\">AI-powered applications have proven to improve not only a company\u2019s workflow but its overall accuracy and performance \u2014 helping them dodge fines and penalties.<\/p>\n<p id=\"216d\" class=\"pw-post-body-paragraph lt lu fo be b lv lw lx ly lz ma mb mc md me mf mg mh mi mj mk ml mm mn mo mp fh bj\" data-selectable-paragraph=\"\">The NLP technique that I will be speaking about in this article is Intelligent Process Automation (IPA). You may or may not have heard about IPA, but it is very similar to Robotic Process Automation (RPA).<\/p>\n<p id=\"cbc4\" class=\"pw-post-body-paragraph lt lu fo be b lv lw lx ly lz ma mb mc md me mf mg mh mi mj mk ml mm mn mo mp fh bj\" data-selectable-paragraph=\"\">You may also have not heard of RPA, so let me define it for you.<\/p>\n<p id=\"ac8a\" class=\"pw-post-body-paragraph lt lu fo be b lv lw lx ly lz ma mb mc md me mf mg mh mi mj mk ml mm mn mo mp fh bj\" data-selectable-paragraph=\"\"><strong class=\"be mq\">Robotic Process Automation (RPA)<\/strong> is a technique used to make companies\u2019 lives easier to build, deploy, and manage software robots or artificial intelligence workers. RPA technology is used to emulate human actions, such as website scrapping, call center operations, and more.<\/p>\n<p id=\"7363\" class=\"pw-post-body-paragraph lt lu fo be b lv lw lx ly lz ma mb mc md me mf mg mh mi mj mk ml mm mn mo mp fh bj\" data-selectable-paragraph=\"\">RPA uses repetitive manual tasks and learned data to then go on to use bots or software robots to replace them with automated workflows. Although this process is good and has proven to work, IPA takes RPA to the next level.<\/p>\n<h1 id=\"0681\" class=\"mr ms fo be mt mu mv mw mx my mz na nb nc nd ne nf ng nh ni nj nk nl nm nn no bj\" data-selectable-paragraph=\"\">So what does RPA have to do with IPA?<\/h1>\n<p id=\"e7f7\" class=\"pw-post-body-paragraph lt lu fo be b lv np lx ly lz nq mb mc md nr mf mg mh ns mj mk ml nt mn mo mp fh bj\" data-selectable-paragraph=\"\"><strong class=\"be mq\">Intelligent Process Automation (IPA)<\/strong> is also known as hyper-automation, intelligent automation, or digital process automation. It combines RPA with process mining, OCR, analytics, and artificial intelligence (AI). The automation capabilities performance has proven to increase the value of a business and its competitive advantage. It has shown an enhanced work environment, increases in performance, quicker reaction times, increases in efficiency, improved customer experiences, and lower operational risks.<\/p>\n<p id=\"7071\" class=\"pw-post-body-paragraph lt lu fo be b lv lw lx ly lz ma mb mc md me mf mg mh mi mj mk ml mm mn mo mp fh bj\" data-selectable-paragraph=\"\">IPA can be utilized in Computer Vision, Cognitive automation, process mining, NLP, and Machine Learning. Adding cognitive technologies such as AI to the mix with RPA allows businesses to expand their automation process \u2014 benefiting them in a variety of areas.<\/p>\n<p id=\"4f91\" class=\"pw-post-body-paragraph lt lu fo be b lv lw lx ly lz ma mb mc md me mf mg mh mi mj mk ml mm mn mo mp fh bj\" data-selectable-paragraph=\"\">For compliance processes, the most used tool to process documentation is OCR, Optical Character Recognition. OCR has the ability to recognize text within a digital image and translates it into machine-encoded text. This can be used in invoices, bank statements, etc.<\/p>\n<p id=\"96ae\" class=\"pw-post-body-paragraph lt lu fo be b lv lw lx ly lz ma mb mc md me mf mg mh mi mj mk ml mm mn mo mp fh bj\" data-selectable-paragraph=\"\">Although this is a well-used process, it comes with its limitations in the world of AI technology, namely interpretability. Although OCR can turn data into machine-encoded text, does it understand what the text means? Unfortunately no. Not only can it not understand the text, but the text also has to be printed and not handwritten \u2014 heavily reducing the performance of the tool.<\/p>\n<p id=\"d526\" class=\"pw-post-body-paragraph lt lu fo be b lv lw lx ly lz ma mb mc md me mf mg mh mi mj mk ml mm mn mo mp fh bj\" data-selectable-paragraph=\"\">The process also requires human intervention in order to complete the conversion and it cannot handle complex data. This is a manual process bottleneck as 80% of data being circulated today is in an unstructured format.<\/p>\n<p id=\"8776\" class=\"pw-post-body-paragraph lt lu fo be b lv lw lx ly lz ma mb mc md me mf mg mh mi mj mk ml mm mn mo mp fh bj\" data-selectable-paragraph=\"\">When it comes to compliance checks, this is a major limitation. This is where I introduce Intelligent Document Processing.<\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"fh fi fj fk fl\">\n<div class=\"ab ca\">\n<div class=\"ch bg et eu ev ew\">\n<blockquote class=\"oo\"><p id=\"9513\" class=\"op oq fo be or os ot ou ov ow ox mp dv\" data-selectable-paragraph=\"\">Small teams can make a big difference, just ask GE Healthcare\u2019s Vignesh Shetty. <a class=\"af nu\" href=\"https:\/\/go.comet.ml\/webinar-Machine-Learning-Vignesh-ShettyGE-Healthcare.html\" target=\"_blank\" rel=\"noopener ugc nofollow\">A team of three worked to create automated mobile x-ray machines with high level processing tools to help streamline the urgent care process.<\/a><\/p><\/blockquote>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"fh fi fj fk fl\">\n<div class=\"ab ca\">\n<div class=\"ch bg et eu ev ew\">\n<h1 id=\"be45\" class=\"mr ms fo be mt mu oy mw mx my oz na nb nc pa ne nf ng pb ni nj nk pc nm nn no bj\" data-selectable-paragraph=\"\">Intelligent Document Processing<\/h1>\n<p id=\"2574\" class=\"pw-post-body-paragraph lt lu fo be b lv np lx ly lz nq mb mc md nr mf mg mh ns mj mk ml nt mn mo mp fh bj\" data-selectable-paragraph=\"\"><strong class=\"be mq\">Intelligent Document Processing (IDP)<\/strong> has the ability to convert unstructured data into a structured format using NLP. it creates valuable information from the data which provides end-to-end automation to document-centric business processes.<\/p>\n<figure class=\"pg ph pi pj pk pl pd pe paragraph-image\">\n<div class=\"pm pn eb po bg pp\" tabindex=\"0\" role=\"button\">\n<figure><img loading=\"lazy\" decoding=\"async\" class=\"bg pq pr c\" role=\"presentation\" src=\"https:\/\/miro.medium.com\/v2\/resize:fit:700\/0*tCTDPAIf8EZzC5JJ.png\" alt=\"\" width=\"700\" height=\"375\"><\/figure><div class=\"pd pe pf\"><picture><source srcset=\"https:\/\/miro.medium.com\/v2\/resize:fit:640\/format:webp\/0*tCTDPAIf8EZzC5JJ.png 640w, https:\/\/miro.medium.com\/v2\/resize:fit:720\/format:webp\/0*tCTDPAIf8EZzC5JJ.png 720w, https:\/\/miro.medium.com\/v2\/resize:fit:750\/format:webp\/0*tCTDPAIf8EZzC5JJ.png 750w, https:\/\/miro.medium.com\/v2\/resize:fit:786\/format:webp\/0*tCTDPAIf8EZzC5JJ.png 786w, https:\/\/miro.medium.com\/v2\/resize:fit:828\/format:webp\/0*tCTDPAIf8EZzC5JJ.png 828w, https:\/\/miro.medium.com\/v2\/resize:fit:1100\/format:webp\/0*tCTDPAIf8EZzC5JJ.png 1100w, https:\/\/miro.medium.com\/v2\/resize:fit:1400\/format:webp\/0*tCTDPAIf8EZzC5JJ.png 1400w\" type=\"image\/webp\" sizes=\"(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 700px\"><source srcset=\"https:\/\/miro.medium.com\/v2\/resize:fit:640\/0*tCTDPAIf8EZzC5JJ.png 640w, https:\/\/miro.medium.com\/v2\/resize:fit:720\/0*tCTDPAIf8EZzC5JJ.png 720w, https:\/\/miro.medium.com\/v2\/resize:fit:750\/0*tCTDPAIf8EZzC5JJ.png 750w, https:\/\/miro.medium.com\/v2\/resize:fit:786\/0*tCTDPAIf8EZzC5JJ.png 786w, https:\/\/miro.medium.com\/v2\/resize:fit:828\/0*tCTDPAIf8EZzC5JJ.png 828w, https:\/\/miro.medium.com\/v2\/resize:fit:1100\/0*tCTDPAIf8EZzC5JJ.png 1100w, https:\/\/miro.medium.com\/v2\/resize:fit:1400\/0*tCTDPAIf8EZzC5JJ.png 1400w\" sizes=\"(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 700px\" data-testid=\"og\"><\/picture><\/div>\n<\/div><figcaption class=\"ps pt pu pd pe pv pw be b bf z dv\" data-selectable-paragraph=\"\"><a class=\"af nu\" href=\"https:\/\/ephesoft.com\/intelligent-document-processing\/\" target=\"_blank\" rel=\"noopener ugc nofollow\">Ephesoft<\/a><\/figcaption><\/figure>\n<h2 id=\"fabf\" class=\"px ms fo be mt py pz qa mx qb qc qd nb md qe qf qg mh qh qi qj ml qk ql qm qn bj\" data-selectable-paragraph=\"\">How does this process work?<\/h2>\n<ol class=\"\">\n<li id=\"a1be\" class=\"lt lu fo be b lv np lx ly lz nq mb mc md qo mf mg mh qp mj mk ml qq mn mo mp qr nz oa bj\" data-selectable-paragraph=\"\"><strong class=\"be mq\">Collection of Data<\/strong> \u2014 this is the first step in the IDP process. Different forms of unstructured and semi-structured data will be collated such as emails, PDF files, scanned documents, excel files, etc.<\/li>\n<li id=\"4ec9\" class=\"lt lu fo be b lv ob lx ly lz oc mb mc md od mf mg mh oe mj mk ml of mn mo mp qr nz oa bj\" data-selectable-paragraph=\"\"><strong class=\"be mq\">Pre-Processing<\/strong> \u2014 This next step involves binarization, noise reduction, cropping, and deskewing of the data to present the data in a more understandable format<\/li>\n<li id=\"ec22\" class=\"lt lu fo be b lv ob lx ly lz oc mb mc md od mf mg mh oe mj mk ml of mn mo mp qr nz oa bj\" data-selectable-paragraph=\"\"><strong class=\"be mq\">Classification<\/strong> \u2014 At this point, the data is a better format for the documents to be classified using supervised and unsupervised tools such as NLP and OCR.<\/li>\n<li id=\"88ff\" class=\"lt lu fo be b lv ob lx ly lz oc mb mc md od mf mg mh oe mj mk ml of mn mo mp qr nz oa bj\" data-selectable-paragraph=\"\"><strong class=\"be mq\">Data Extraction<\/strong> \u2014 Data is then extracted from the documents using NLP, NL, Deep Learning, and OCR. There are various tools that you can use, for example, Google Vision can detect handwriting in images.<\/li>\n<li id=\"8778\" class=\"lt lu fo be b lv ob lx ly lz oc mb mc md od mf mg mh oe mj mk ml of mn mo mp qr nz oa bj\" data-selectable-paragraph=\"\"><strong class=\"be mq\">Data Validation<\/strong> \u2014 At this point, we want to check if the model created is effective and meaningful and has successfully extracted the correct data inputs for compliance.<\/li>\n<li id=\"ef7a\" class=\"lt lu fo be b lv ob lx ly lz oc mb mc md od mf mg mh oe mj mk ml of mn mo mp qr nz oa bj\" data-selectable-paragraph=\"\"><strong class=\"be mq\">Human-in-the-Loop Validation<\/strong> \u2014 The best way to validate your model is to get a human to validate it.<\/li>\n<li id=\"6dcf\" class=\"lt lu fo be b lv ob lx ly lz oc mb mc md od mf mg mh oe mj mk ml of mn mo mp qr nz oa bj\" data-selectable-paragraph=\"\"><strong class=\"be mq\">Integrate<\/strong> \u2014 After the model has been validated, the last step will be data integration. You will input the structured data into a system, such as CRM which can be used for future purposes.<\/li>\n<\/ol>\n<h1 id=\"4d6f\" class=\"mr ms fo be mt mu mv mw mx my mz na nb nc nd ne nf ng nh ni nj nk nl nm nn no bj\" data-selectable-paragraph=\"\">What NLP techniques are used in this process?<\/h1>\n<figure class=\"pg ph pi pj pk pl pd pe paragraph-image\">\n<figure><img loading=\"lazy\" decoding=\"async\" class=\"bg pq pr c\" role=\"presentation\" src=\"https:\/\/miro.medium.com\/v2\/resize:fit:600\/0*vbdW07Cqo7S4bWxi.jpg\" alt=\"\" width=\"600\" height=\"332\"><\/figure><div class=\"pd pe qs\"><picture><source srcset=\"https:\/\/miro.medium.com\/v2\/resize:fit:640\/format:webp\/0*vbdW07Cqo7S4bWxi.jpg 640w, https:\/\/miro.medium.com\/v2\/resize:fit:720\/format:webp\/0*vbdW07Cqo7S4bWxi.jpg 720w, https:\/\/miro.medium.com\/v2\/resize:fit:750\/format:webp\/0*vbdW07Cqo7S4bWxi.jpg 750w, https:\/\/miro.medium.com\/v2\/resize:fit:786\/format:webp\/0*vbdW07Cqo7S4bWxi.jpg 786w, https:\/\/miro.medium.com\/v2\/resize:fit:828\/format:webp\/0*vbdW07Cqo7S4bWxi.jpg 828w, https:\/\/miro.medium.com\/v2\/resize:fit:1100\/format:webp\/0*vbdW07Cqo7S4bWxi.jpg 1100w, https:\/\/miro.medium.com\/v2\/resize:fit:1200\/format:webp\/0*vbdW07Cqo7S4bWxi.jpg 1200w\" type=\"image\/webp\" sizes=\"(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 600px\"><source srcset=\"https:\/\/miro.medium.com\/v2\/resize:fit:640\/0*vbdW07Cqo7S4bWxi.jpg 640w, https:\/\/miro.medium.com\/v2\/resize:fit:720\/0*vbdW07Cqo7S4bWxi.jpg 720w, https:\/\/miro.medium.com\/v2\/resize:fit:750\/0*vbdW07Cqo7S4bWxi.jpg 750w, https:\/\/miro.medium.com\/v2\/resize:fit:786\/0*vbdW07Cqo7S4bWxi.jpg 786w, https:\/\/miro.medium.com\/v2\/resize:fit:828\/0*vbdW07Cqo7S4bWxi.jpg 828w, https:\/\/miro.medium.com\/v2\/resize:fit:1100\/0*vbdW07Cqo7S4bWxi.jpg 1100w, https:\/\/miro.medium.com\/v2\/resize:fit:1200\/0*vbdW07Cqo7S4bWxi.jpg 1200w\" sizes=\"(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 600px\" data-testid=\"og\"><\/picture><\/div>\n<figcaption class=\"ps pt pu pd pe pv pw be b bf z dv\" data-selectable-paragraph=\"\"><a class=\"af nu\" href=\"https:\/\/nexocode.com\/blog\/posts\/definitive-guide-to-nlp\/\" target=\"_blank\" rel=\"noopener ugc nofollow\">nexocode<\/a><\/figcaption>\n<\/figure>\n<p id=\"40e1\" class=\"pw-post-body-paragraph lt lu fo be b lv lw lx ly lz ma mb mc md me mf mg mh mi mj mk ml mm mn mo mp fh bj\" data-selectable-paragraph=\"\">As mentioned, the IDP process is used to easily extract information and classify it accurately. The NLP tools used in this process include:<\/p>\n<p id=\"5487\" class=\"pw-post-body-paragraph lt lu fo be b lv lw lx ly lz ma mb mc md me mf mg mh mi mj mk ml mm mn mo mp fh bj\" data-selectable-paragraph=\"\"><strong class=\"be mq\">Named Entity Recognition<\/strong> \u2014 locates and classifies named entities found in the unstructured text. This can be a person\u2019s name, organization, location, time expressions, monetary values, percentages, and more.<\/p>\n<p id=\"4932\" class=\"pw-post-body-paragraph lt lu fo be b lv lw lx ly lz ma mb mc md me mf mg mh mi mj mk ml mm mn mo mp fh bj\" data-selectable-paragraph=\"\"><strong class=\"be mq\">Named Entity Linking<\/strong> \u2014 this tool is used to help identify and match unique entities. It is also referred to as Entity Linking, Named Entity Disambiguation (NED), Named Entity Recognition\/Disambiguation (NERD), or Named Entity Normalization (NEN).<\/p>\n<p id=\"f5dd\" class=\"pw-post-body-paragraph lt lu fo be b lv lw lx ly lz ma mb mc md me mf mg mh mi mj mk ml mm mn mo mp fh bj\" data-selectable-paragraph=\"\"><strong class=\"be mq\">Semantic Matching<\/strong> \u2014 this tool is used to identify the relationship between data points improving the model\u2019s performance. It determines in a semantic manner if two or more data points have any form of similarity.<\/p>\n<p id=\"82f0\" class=\"pw-post-body-paragraph lt lu fo be b lv lw lx ly lz ma mb mc md me mf mg mh mi mj mk ml mm mn mo mp fh bj\" data-selectable-paragraph=\"\"><strong class=\"be mq\">Text Classification<\/strong> \u2014 the simplest form of NLP which is used to identify text from documents such as passports, proof of address, and more.<\/p>\n<h1 id=\"9bdb\" class=\"mr ms fo be mt mu mv mw mx my mz na nb nc nd ne nf ng nh ni nj nk nl nm nn no bj\" data-selectable-paragraph=\"\">How does this help with compliance?<\/h1>\n<p id=\"e631\" class=\"pw-post-body-paragraph lt lu fo be b lv np lx ly lz nq mb mc md nr mf mg mh ns mj mk ml nt mn mo mp fh bj\" data-selectable-paragraph=\"\">When you think of compliance checks, it\u2019s a lot of documentation screening that needs to be accurately reviewed. This can be for passport checks, mortgage loans, applications, and more.<\/p>\n<p id=\"f27c\" class=\"pw-post-body-paragraph lt lu fo be b lv lw lx ly lz ma mb mc md me mf mg mh mi mj mk ml mm mn mo mp fh bj\" data-selectable-paragraph=\"\">These NLP techniques can be used for:<\/p>\n<ul class=\"\">\n<li id=\"f33d\" class=\"lt lu fo be b lv lw lx ly lz ma mb mc md nv mf mg mh nw mj mk ml nx mn mo mp ny nz oa bj\" data-selectable-paragraph=\"\">Identity verification<\/li>\n<li id=\"d075\" class=\"lt lu fo be b lv ob lx ly lz oc mb mc md od mf mg mh oe mj mk ml of mn mo mp ny nz oa bj\" data-selectable-paragraph=\"\">Collating customer information<\/li>\n<li id=\"216e\" class=\"lt lu fo be b lv ob lx ly lz oc mb mc md od mf mg mh oe mj mk ml of mn mo mp ny nz oa bj\" data-selectable-paragraph=\"\">Managing customer information<\/li>\n<li id=\"673b\" class=\"lt lu fo be b lv ob lx ly lz oc mb mc md od mf mg mh oe mj mk ml of mn mo mp ny nz oa bj\" data-selectable-paragraph=\"\">Monitoring financial transactions<\/li>\n<li id=\"3081\" class=\"lt lu fo be b lv ob lx ly lz oc mb mc md od mf mg mh oe mj mk ml of mn mo mp ny nz oa bj\" data-selectable-paragraph=\"\">Customer list screening<\/li>\n<li id=\"2abe\" class=\"lt lu fo be b lv ob lx ly lz oc mb mc md od mf mg mh oe mj mk ml of mn mo mp ny nz oa bj\" data-selectable-paragraph=\"\">Checking invoices and receipts<\/li>\n<li id=\"c97a\" class=\"lt lu fo be b lv ob lx ly lz oc mb mc md od mf mg mh oe mj mk ml of mn mo mp ny nz oa bj\" data-selectable-paragraph=\"\">Inputting Customer Data into the CRM<\/li>\n<li id=\"6fe2\" class=\"lt lu fo be b lv ob lx ly lz oc mb mc md od mf mg mh oe mj mk ml of mn mo mp ny nz oa bj\" data-selectable-paragraph=\"\">Customer service used with bots<\/li>\n<\/ul>\n<p id=\"9085\" class=\"pw-post-body-paragraph lt lu fo be b lv lw lx ly lz ma mb mc md me mf mg mh mi mj mk ml mm mn mo mp fh bj\" data-selectable-paragraph=\"\">All the above processes are time-consuming and costly \u2014 especially with the shifts due to the pandemic. Not only does ML reduce the amount of time spent manually completing tasks and cut back your costs, but it has also proven to show an overall increase in compliance performance.<\/p>\n<p id=\"adf2\" class=\"pw-post-body-paragraph lt lu fo be b lv lw lx ly lz ma mb mc md me mf mg mh mi mj mk ml mm mn mo mp fh bj\" data-selectable-paragraph=\"\">It is not the most innovative implementation a company can make to see an increase in its revenue and performance, but it is vital for organizations that want to improve their compliance checks and strategy to avoid fines and penalties.<\/p>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>AI-powered applications and solutions have become a major catalyst when it comes to compliance checks, particularly in NLP. The aim of this article is to go through NLP techniques and how you can apply them to your company&#8217;s compliance process to make it easier and more efficient. We have all had to adapt to the [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"customer_name":"","customer_description":"","customer_industry":"","customer_technologies":"","customer_logo":"","footnotes":""},"categories":[6],"tags":[],"coauthors":[139],"class_list":["post-7613","post","type-post","status-publish","format-standard","hentry","category-machine-learning"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.9 (Yoast SEO v25.9) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>NLP techniques used for compliance checks - Comet<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.comet.com\/site\/blog\/nlp-techniques-used-for-compliance-checks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"NLP techniques used for compliance checks\" \/>\n<meta property=\"og:description\" content=\"AI-powered applications and solutions have become a major catalyst when it comes to compliance checks, particularly in NLP. The aim of this article is to go through NLP techniques and how you can apply them to your company&#8217;s compliance process to make it easier and more efficient. We have all had to adapt to the [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.comet.com\/site\/blog\/nlp-techniques-used-for-compliance-checks\/\" \/>\n<meta property=\"og:site_name\" content=\"Comet\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/cometdotml\" \/>\n<meta property=\"article:published_time\" content=\"2023-09-22T19:50:48+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-24T17:13:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/miro.medium.com\/v2\/resize:fit:700\/0*tCTDPAIf8EZzC5JJ.png\" \/>\n<meta name=\"author\" content=\"Nisha Arya Ahmed\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Cometml\" \/>\n<meta name=\"twitter:site\" content=\"@Cometml\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Nisha Arya Ahmed\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"NLP techniques used for compliance checks - Comet","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.comet.com\/site\/blog\/nlp-techniques-used-for-compliance-checks\/","og_locale":"en_US","og_type":"article","og_title":"NLP techniques used for compliance checks","og_description":"AI-powered applications and solutions have become a major catalyst when it comes to compliance checks, particularly in NLP. The aim of this article is to go through NLP techniques and how you can apply them to your company&#8217;s compliance process to make it easier and more efficient. We have all had to adapt to the [&hellip;]","og_url":"https:\/\/www.comet.com\/site\/blog\/nlp-techniques-used-for-compliance-checks\/","og_site_name":"Comet","article_publisher":"https:\/\/www.facebook.com\/cometdotml","article_published_time":"2023-09-22T19:50:48+00:00","article_modified_time":"2025-04-24T17:13:54+00:00","og_image":[{"url":"https:\/\/miro.medium.com\/v2\/resize:fit:700\/0*tCTDPAIf8EZzC5JJ.png","type":"","width":"","height":""}],"author":"Nisha Arya Ahmed","twitter_card":"summary_large_image","twitter_creator":"@Cometml","twitter_site":"@Cometml","twitter_misc":{"Written by":"Nisha Arya Ahmed","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.comet.com\/site\/blog\/nlp-techniques-used-for-compliance-checks\/#article","isPartOf":{"@id":"https:\/\/www.comet.com\/site\/blog\/nlp-techniques-used-for-compliance-checks\/"},"author":{"name":"Team Comet Digital","@id":"https:\/\/www.comet.com\/site\/#\/schema\/person\/6266601170c60a7a82b3e0043fbe8ddf"},"headline":"NLP techniques used for compliance checks","datePublished":"2023-09-22T19:50:48+00:00","dateModified":"2025-04-24T17:13:54+00:00","mainEntityOfPage":{"@id":"https:\/\/www.comet.com\/site\/blog\/nlp-techniques-used-for-compliance-checks\/"},"wordCount":1495,"publisher":{"@id":"https:\/\/www.comet.com\/site\/#organization"},"image":{"@id":"https:\/\/www.comet.com\/site\/blog\/nlp-techniques-used-for-compliance-checks\/#primaryimage"},"thumbnailUrl":"https:\/\/miro.medium.com\/v2\/resize:fit:700\/0*tCTDPAIf8EZzC5JJ.png","articleSection":["Machine Learning"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.comet.com\/site\/blog\/nlp-techniques-used-for-compliance-checks\/","url":"https:\/\/www.comet.com\/site\/blog\/nlp-techniques-used-for-compliance-checks\/","name":"NLP techniques used for compliance checks - Comet","isPartOf":{"@id":"https:\/\/www.comet.com\/site\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.comet.com\/site\/blog\/nlp-techniques-used-for-compliance-checks\/#primaryimage"},"image":{"@id":"https:\/\/www.comet.com\/site\/blog\/nlp-techniques-used-for-compliance-checks\/#primaryimage"},"thumbnailUrl":"https:\/\/miro.medium.com\/v2\/resize:fit:700\/0*tCTDPAIf8EZzC5JJ.png","datePublished":"2023-09-22T19:50:48+00:00","dateModified":"2025-04-24T17:13:54+00:00","breadcrumb":{"@id":"https:\/\/www.comet.com\/site\/blog\/nlp-techniques-used-for-compliance-checks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.comet.com\/site\/blog\/nlp-techniques-used-for-compliance-checks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.comet.com\/site\/blog\/nlp-techniques-used-for-compliance-checks\/#primaryimage","url":"https:\/\/miro.medium.com\/v2\/resize:fit:700\/0*tCTDPAIf8EZzC5JJ.png","contentUrl":"https:\/\/miro.medium.com\/v2\/resize:fit:700\/0*tCTDPAIf8EZzC5JJ.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.comet.com\/site\/blog\/nlp-techniques-used-for-compliance-checks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.comet.com\/site\/"},{"@type":"ListItem","position":2,"name":"NLP techniques used for compliance checks"}]},{"@type":"WebSite","@id":"https:\/\/www.comet.com\/site\/#website","url":"https:\/\/www.comet.com\/site\/","name":"Comet","description":"Build Better Models Faster","publisher":{"@id":"https:\/\/www.comet.com\/site\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.comet.com\/site\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.comet.com\/site\/#organization","name":"Comet ML, Inc.","alternateName":"Comet","url":"https:\/\/www.comet.com\/site\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.comet.com\/site\/#\/schema\/logo\/image\/","url":"https:\/\/www.comet.com\/site\/wp-content\/uploads\/2025\/01\/logo_comet_square.png","contentUrl":"https:\/\/www.comet.com\/site\/wp-content\/uploads\/2025\/01\/logo_comet_square.png","width":310,"height":310,"caption":"Comet ML, Inc."},"image":{"@id":"https:\/\/www.comet.com\/site\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/cometdotml","https:\/\/x.com\/Cometml","https:\/\/www.youtube.com\/channel\/UCmN63HKvfXSCS-UwVwmK8Hw"]},{"@type":"Person","@id":"https:\/\/www.comet.com\/site\/#\/schema\/person\/6266601170c60a7a82b3e0043fbe8ddf","name":"Team Comet Digital","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.comet.com\/site\/#\/schema\/person\/image\/4f0c0a8cc7c0e87c636ff6a420a6647c","url":"https:\/\/www.comet.com\/site\/wp-content\/uploads\/2023\/08\/Screen-Shot-2023-08-12-at-8.58.50-AM-96x96.png","contentUrl":"https:\/\/www.comet.com\/site\/wp-content\/uploads\/2023\/08\/Screen-Shot-2023-08-12-at-8.58.50-AM-96x96.png","caption":"Team Comet Digital"},"sameAs":["https:\/\/www.comet.ml\/"],"url":"https:\/\/www.comet.com\/site\/blog\/author\/teamcometdigital\/"}]}},"_links":{"self":[{"href":"https:\/\/www.comet.com\/site\/wp-json\/wp\/v2\/posts\/7613","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.comet.com\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.comet.com\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.comet.com\/site\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.comet.com\/site\/wp-json\/wp\/v2\/comments?post=7613"}],"version-history":[{"count":1,"href":"https:\/\/www.comet.com\/site\/wp-json\/wp\/v2\/posts\/7613\/revisions"}],"predecessor-version":[{"id":15532,"href":"https:\/\/www.comet.com\/site\/wp-json\/wp\/v2\/posts\/7613\/revisions\/15532"}],"wp:attachment":[{"href":"https:\/\/www.comet.com\/site\/wp-json\/wp\/v2\/media?parent=7613"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.comet.com\/site\/wp-json\/wp\/v2\/categories?post=7613"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.comet.com\/site\/wp-json\/wp\/v2\/tags?post=7613"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.comet.com\/site\/wp-json\/wp\/v2\/coauthors?post=7613"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}