An overview of changes to Companies House identity verification standard (and what it means for ACSPs)

profile picture Matt Prendergast 3 min read
Companies house identity verification

As an Authorised Corporate Service Provider (ACSP), you’ll be aware of the upcoming changes to the Companies House identity verification standard.

In 2025, anyone setting up, running, owning or controlling a company in the UK, namely directors and persons with significant control (PSCs), will be required to verify their identity to prove who they are.

These changes come as part of the Economic Crime and Corporate Transparency Act 2023 and aim to prevent anyone seeking to use Companies House for fraudulent activities. Failing to comply with mandatory identity verification requirements could result in fines and restrictions on company activities.

From 18th March 2025, directors and PSCs can voluntarily verify their identity directly with Companies House via GOV.UK One Login free of charge. Alternatively, they can choose to verify their identity via an ACSP like yourself.

You will need to register to conduct identity verification on behalf of clients, and from 8th April, you can inform Companies House you have verified someone’s identity. You must already be registered with an Anti-Money Laundering (AML) supervisory body.

Key dates:

  • 18th March 2025: Voluntary identity verification – directors and PSCs involved in UK companies can voluntarily verify their identity.
  • 8th April 2025: ACSPs can inform Companies House they have verified someone’s identity.
  • By Autumn 2025: Mandatory identity verification – for directors and PSCs involved in UK companies, it will be mandatory to verify identity when they are appointed. For existing directors and PSCs, there will be a 12 month period for them to complete identity verification.

 

How to verify someone’s identity for Companies House

When you verify someone’s identity for Companies House, you must meet the identity verification standard to comply with your legal responsibilities as an ACSP. You will be required to ask for information about the person and to get evidence to verify their identity in the form of documentation. One option to achieve this is to use identification document validation technology (IDVT) such as that provided by Yoti.

Our fast and secure identity verification service, with built-in anti-spoofing technology, allows your clients to remotely prove who they are with just an ID document and a selfie. You can opt to use our automated process which will take clients just 5 seconds to complete, or layer in our 24/7 verification experts for cases that require higher assurance.

Get in touch to find out more about our IDVT and how you can meet the Companies House identity verification standard.

Keep reading

Synthetic identity fraud is committed by the theft of a real piece of persoanl information such as an SSN, and combined with false information to make up an entirely synthetic identity that often bypasses traditional checks

What is synthetic identity fraud? How it works and how to prevent it

What is synthetic identity fraud? Synthetic identities are fake identities, built by combining real and made-up information, earning them the nickname “Frankenstein IDs” due to their pieced-together nature. Synthetic identity fraud is different to traditional identity fraud as it doesn’t involve an obvious, immediate consumer victim. These fake profiles are designed to mimic real customers, often slipping past traditional fraud detection systems because they don’t raise typical red flags. As a result, the primary victims of synthetic identity fraud are businesses and lenders, who bear the financial losses.   How synthetic identities are created and used

8 min read
Graphic depicting the balance security and user experience with robust authentication methods such as MFA, biometrics and passwordless, versus a traditional username and password

Beyond passwords: exploring modern authentication methods for secure login

As online threats grow more sophisticated, the way we authenticate users needs to evolve. This blog explores the modern authentication methods which can support or replace passwords, such as biometrics and verified digital IDs, and how businesses can use them to protect accounts, reduce fraud and build trust with users.   What is authentication? Authentication is the process of verifying that someone is who they say they are, typically before granting them access to a service or system. Traditionally, this has involved entering a username and password, something only the user should know.   Are passwords enough to keep

6 min read

Under the hood of facial age estimation

Since the UK Online Safety Act came into force on Friday 25th July, there has been a lot of discussion about how effective age checks are.  Facial age estimation has been approved by Ofcom as a high assurance method for online age checks. It’s a quick, private and effective way to confirm if someone is above or below an age threshold.  Each facial age estimation is quick and simple – taking around one second. This has sparked conversation when talking to businesses, press, regulators and governments – one of the most striking comments we’ve heard when showing them the

3 min read