Skip to content

FAQs

What Does Chekbox Do?

Chekbox is a compliance and data security platform designed specifically for professional services firms (like lawyers, accountants, agents and brokers).

We transform your high-risk, manual client onboarding and document management processes into a secure, automated digital workflow.

In short, Chekbox allows your firm to:

  • Secure Client Identity: Conduct robust, auditable identity verification that fully complies with AML/CTF, ATO, and ARNECC standards, ensuring your firm is Tranche 2 Ready for future regulatory requirements.
  • Guarantee Document Integrity: Securely store all sensitive client files. Every document receives a unique digital fingerprint (Hash ID), allowing us to instantly validate against the immutable blockchain record and detect if even a single pixel has been tampered with.
  • Automate Compliance & Onboarding: Eliminate manual data entry with smart forms and auto-population, and manage secure e-signatures and official digital document certifications, drastically improving efficiency and reducing error rates.

We provide the uncompromising security and regulatory certainty required to operate with absolute trust and peace of mind.

How do I make sure my firm's documents are compliant?

Chekbox ensures document compliance through three interconnected, automated security layers:

  1. Identity Verification and Documentation: By using our system to verify client identity, you automatically generate a certified audit trail that confirms the verification process met specific regulatory standards (AML/CTF, ARNECC, ATO). 
  2. Unbreakable Integrity (Hash ID): When a document is stored or signed, we generate a unique digital fingerprint (Hash ID) that can be secured on the blockchain. This process guarantees the document's content is authentic and unalterable from that moment forward, eliminating the risk of using a fraudulent or tampered file in a regulated transaction.
  3. Auditable Chain of Custody: Every document interaction—upload, signature, certification, or view—is logged in a permanent, time-stamped audit record. This provides the indisputable evidence required to demonstrate compliance during any internal or external regulatory audit.

In essence, Chekbox shifts the burden of compliance from manual checklist management to an automated, auditable digital workflow.

When is the Tranche 2 deadline?

The official commencement date for the expansion of the AML/CTF regime to Tranche 2 entities (including lawyers, accountants, and real estate professionals) is July 1, 2026.

While that date may seem distant, the new regime requires firms to implement significant changes to their Customer Due Diligence (CDD) processes, record-keeping, and ongoing monitoring.

Chekbox is Tranche 2 Ready today. By adopting our platform now, you gain:

  • Zero-Stress Transition: You can implement and test your new, compliant processes well in advance.
  • Future-Proof Certainty: You ensure your firm meets all new, stricter obligations without rushing to implement a solution just before the deadline.

It is highly recommended that regulated firms begin planning and implementing their Tranche 2-compliant solutions now to avoid penalties.

What does my firm need to do to be ready for Tranche 2?

To comply with the AML/CTF Tranche 2 requirements commencing July 1, 2026, your firm must transition from its current practices to a formal, risk-based AML/CTF Program. This involves several critical steps:

Required Compliance Steps

  1. Enrol with AUSTRAC: If your firm provides a "designated service," you must enrol with AUSTRAC as a Reporting Entity. Enrollment opens from March 31, 2026.
  2. Conduct a Risk Assessment: You must formally assess and document the money laundering and terrorism financing (ML/TF) risks specific to your business, your clients, and the services you provide.
  3. Develop an AML/CTF Program: You must create and maintain a written, Board/Senior Management-approved AML/CTF Program tailored to your risk assessment. This includes establishing policies for Customer Due Diligence (CDD) and record-keeping.
  4. Appoint an AML/CTF Compliance Officer: A fit and proper person at the management level must be designated to oversee compliance and liaise with AUSTRAC.
  5. Strengthen CDD and Ongoing Monitoring: You must implement robust processes for initial identity verification (KYC), Enhanced Customer Due Diligence (ECDD) for high-risk clients, and ongoing monitoring of client relationships.
  6. Staff Training and Reporting: All relevant staff must receive ongoing training on AML/CTF obligations, and you must establish systems for mandatory reporting (e.g., Suspicious Matter Reports) to AUSTRAC.

How Chekbox Makes You Tranche 2 Ready

Chekbox is your technology solution for managing the most time-consuming and high-risk elements of the new regime:

  • Automated CDD: Our system automates the necessary initial and ongoing customer due diligence, providing certified verification records that satisfy AUSTRAC requirements.
  • Audit-Ready Records: We provide the secure, centralised, and immutable record-keeping required for all verification and client data for the mandated period.
  • Reduced Risk: By providing a compliant platform for identity verification, document integrity (Hash ID), and secure record management, we significantly reduce your firm's exposure to ML/TF risk and demonstrate a commitment to compliance.

Start preparing now. Chekbox is the proactive step your firm can take today to ensure a seamless transition to the Tranche 2 regime.

Is Chekbox a cloud-based solution, and how does that affect accessibility? Yes, Chekbox is a secure, cloud-based platform. This allows qualified staff to securely access and manage documents from anywhere, on any device (desktop, tablet, or mobile), with their permissions fully controlled. This flexibility is essential for modern, hybrid professional workforces.

Can Chekbox integrate with my existing practice management or CRM software? We understand the need for seamless workflows. Chekbox is designed with robust integration capabilities and APIs to connect with popular practice management systems (PMS) and Customer Relationship Management (CRM) tools. This ensures client data flows effortlessly, maximising your investment in existing software.

What kind of training and support is available for my team? We provide comprehensive support and training to ensure rapid adoption and success. This includes dedicated implementation assistance and direct access to our customer service team via phone and email. Our goal is to ensure your team is proficient quickly, minimising disruption and maximizing ROI.

How do I use Chekbox to ensure a document has not been tampered with?

Chekbox uses a patented process that combines cryptographic hashing with the immutability of the blockchain to provide Tamper-Proof Validation down to the pixel level.

The process is simple and is performed automatically whenever you need to rely on a document:

  1. The Digital Fingerprint is Created (Lock)
  • The moment a document is uploaded or signed, the system instantly generates a unique cryptographic hash (Digital Fingerprint) that is mathematically tied to every single character and pixel in that file.
  • This Hash ID is then securely registered on the blockchain, creating an unalterable, time-stamped record of the file's original, authentic state.
  1. The Document is Validated (Key)
  • To verify a document, you select the "Validate" function in Chekbox.
  • The system instantly calculates a new hash for the document's current state.
  • It then compares this new hash against the original Hash ID stored on the blockchain.
  1. The Integrity Proof
  • If the hashes match: The document is 100% authentic, and you receive an Audit Certificate confirming its integrity.
  • If the hashes do not match: This means the document has been altered—even if by a single pixel or character—and the system flags it immediately as compromised, eliminating the risk of accidental or fraudulent use.

This process provides your firm with proof of document authenticity, eliminating the risk of fraud and liability.

How do I ensure the person signing a document is actually who they claim to be?

This is a critical function known as Signer Identity Verification. Our eIDAS-compliant process uses a multi-layered approach to provide the strongest possible identity assurance, significantly reducing your fraud risk and increasing the legal defensibility of the signature.

Our Layered Identity Verification Process

  1. Identity Matching: The signing process is intrinsically linked to the initial Client Identity Verification step. The signer must first prove their identity using verified documents (like passports or driver's licenses) against AML/CTF standards.
  2. 2 Factor Authentication (2FA): Access to the signing session is secured with a second factor (such as a unique code sent to the signer's verified mobile phone or email) to ensure possession of the verified credentials.
  3. Digital Certificate Creation: Once authenticated, a unique digital certificate is issued to the signer for that specific document. This certificate cryptographically binds their verified identity to the electronic signature data, proving they were the one who signed the document.
  4. Audit Trail Evidence: Every step—from the initial verification to the final signature click—is logged in a permanent, time-stamped Audit Trail, recording the signer's IP address, the time of action, and the method of authentication.

This combination of AML-standard identity proofing and eIDAS-compliant cryptographic linking ensures that the electronic signature has the highest legal weight and confidence regarding the signer's true identity.

What happens to a document's security once it's signed? Documents signed using our eIDAS-compliant process are highly secure. You have the option to register the executed document's digital fingerprint onto the blockchain. This creates an immutable, unalterable record of the signed agreement, ensuring permanent proof of execution and eliminating future disputes about the document's content.

Can Chekbox detect if a document has been edited? Yes. Our Tamper-Proof Validation feature detects even the smallest change—down to a single pixel—by comparing the document's current hash against the hash recorded on the immutable blockchain ledger. If the hashes don't match, the document is flagged as compromised.

Is Chekbox compliant with Australian AML/CTF requirements? Absolutely. Our Identity Verification system ensures full compliance with AUSTRAC’s AML/CTF requirements for Customer Due Diligence (CDD) and record-keeping. We also meet standards required by the Australian Taxation Office (ATO) and ARNECC (for conveyancing/property).

What is the legal validity of your e-signatures and certifications? Our electronic signature process is compliant with eIDAS standards, ensuring legal recognition across various jurisdictions. Furthermore, the digital certification function allows qualified staff to create officially recognised 'true and correct copies'.

How long does it take to onboard a new client using the system? Our Automated Onboarding & Smart Forms feature significantly reduces intake time. Because data from ID verification and client forms is automatically populated into the client file, firms typically see a reduction of 75% or more in manual entry time, speeding up client engagement from days to minutes.

Do we have to design our own client forms? You can use our standard compliance templates or create fully customised questionnaires tailored to your specific practice area. Our smart forms ensure you collect the necessary, relevant data, improving efficiency and client experience.

What is the contract length for Chekbox, and are there hidden fees?

We aim for complete cost transparency and flexibility, which is essential for managing your firm's operating budget.

Subscription Structure and Commitment

  • Monthly Subscription Model: Our standard tiered subscriptions are billed monthly with no mandatory long-term lock-in contract. This allows your firm the flexibility to scale up or down your user licenses or adjust your tier based on your current business volume.
  • No Hidden Fees: Your monthly tiered fee covers your core operational needs (secure storage, user access, and platform maintenance). We are fully transparent about additional costs, which only apply to premium, high-value actions (like specific Identity Verification checks or eIDAS signatures) that are charged separately on a per-transaction basis.

Cost Recovery and Transactional Billing

Our hybrid model is designed to be cost-effective:

  • Pay-for-Value: You only pay the transactional fee for the high-security compliance actions you actually perform, keeping your fixed monthly cost lower.
  • Integrated Billing Function: Chekbox automatically tracks these transactional costs per client matter, allowing you to easily oncharge and recover these verifiable compliance expenses from the client via your billing system.

This model ensures your firm benefits from premium security and compliance features while maintaining control over cash flow and cost recovery.

© 2025 Chekbox Tech Pty Ltd. All rights reserved.