Asset tracing can be relevant in the context of unclaimed financial assets and in particular, the process of identifying and recovering unclaimed financial assets. It is also relevant in identifying abandoned assets owned by a judgment debtor for the purpose of execution.
Employees’ Background checks involve a systematic process where an employer conducts thorough checks on candidates to ensure that they are who they claim to be.
Asset Tracing & Recovery – attachment of a Debtor’s property in the form of Shares Introduction. Execution entails the act of carrying out or putting into effect a Judgment of the Court. It involves taking the necessary steps to ensure that the judgment is implemented, and the parties involved comply with its terms. The exact […]
Access control refers to the security measures implemented to regulate and control who can access certain resources, systems, or physical areas within an organization. Access control is essential in information security and aims to protect sensitive data, maintain the confidentiality, integrity, and availability of resources, and prevent unauthorized access or misuse
Anti-Bribery and Anti-Corruption Assistance Occupational fraud typologies highlight different forms of fraud, one of which is corruption. Business corruption is categorized as the second most common type of occupational fraud, with the primary examples being bribery, conflict of interest, improper gratuities, and economic extortion. Bribery and corruption pose significant risks to organizations as they may […]
Threat detection spectrum and advanced threat hunting. A network environment can be defined as a communications system that ties multiple users together. In such an environment, there is a need to establish control measures to detect advanced threats in the network. The security mechanism measures should identify the threat’s movement in, out, and laterally within […]
Customer Due Diligence (CDD) is the process of verifying the identity of customers before establishing a business relationship with them as well as assessing their risk level. CDD assists businesses to manage risks of financial crime which include money laundering and terrorist financing. Criminals launder money mainly using the financial system to transfer funds. Financial […]
Fraud risk assessment as a component of a fraud risk management Fraud risk assessment is a component of fraud risk management strategy that helps an organization and its stakeholders protect itself against fraud. It is a technique by management to detect and understand their fraud exposure, fraud risks, and the efficiency of existing anti-fraud controls […]
Asset Tracing as a means of debt recovery in Corporate Insolvency Litigation. Introduction In simple terms, asset tracing is the process of identifying assets through investigations for a particular purpose [without going into the details to answer questions as to who has a legal right to the assets so traced]. Asset tracing can be distinguished […]
Preventive Strategies for Brand Infringement. Brand protection is the process through which a rights holder puts in place actions/safeguards to protect their brand from any form of infringement. This may involve illegal use of the brand name, logo, or repackaging of products with impure content among other acts which might constitute a breach of your […]