<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Consulting Archives - Riskhouse International Limited</title>
	<atom:link href="https://riskhouse.co.ke/category/consulting/feed/" rel="self" type="application/rss+xml" />
	<link>https://riskhouse.co.ke/category/consulting/</link>
	<description>Forensic Investigation, Risk Management &#38; Compliance Services </description>
	<lastBuildDate>Fri, 20 Feb 2026 07:27:54 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.5</generator>

<image>
	<url>https://riskhouse.co.ke/wp-content/uploads/2022/02/favicon-68x70.png</url>
	<title>Consulting Archives - Riskhouse International Limited</title>
	<link>https://riskhouse.co.ke/category/consulting/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Riskhouse International: Protecting Your Interests</title>
		<link>https://riskhouse.co.ke/riskhouse-international-protecting-your-interests/</link>
		
		<dc:creator><![CDATA[riskuser]]></dc:creator>
		<pubDate>Fri, 20 Feb 2026 07:27:53 +0000</pubDate>
				<category><![CDATA[Consulting]]></category>
		<category><![CDATA[Investigations]]></category>
		<category><![CDATA[Riskhouse International]]></category>
		<guid isPermaLink="false">https://riskhouse.co.ke/?p=9232</guid>

					<description><![CDATA[<p>In today’s fast-moving and increasingly complex business environment, risks are often hidden beneath the surface. Fraud, undisclosed liabilities, reputational exposure, and concealed assets can quietly undermine financial stability and erode trust.</p>
<p>The post <a rel="nofollow" href="https://riskhouse.co.ke/riskhouse-international-protecting-your-interests/">Riskhouse International: Protecting Your Interests</a> appeared first on <a rel="nofollow" href="https://riskhouse.co.ke">Riskhouse International Limited</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>In today’s fast-moving and increasingly complex business environment, risks are often hidden beneath the surface. Fraud, undisclosed liabilities, reputational exposure, and concealed assets can quietly undermine financial stability and erode trust.</p>



<p>At <strong>RISKHOUSE INTERNATIONAL LIMITED</strong>, we specialize in uncovering the truth through discreet, professional investigations that empower our clients to make informed and confident decisions.</p>



<ol class="wp-block-list">
<li><strong>Fraud Investigations</strong></li>
</ol>



<p>Fraud does more than cause financial loss, it damages credibility, stakeholder confidence, and long-term growth.</p>



<p>Our investigative team applies advanced methodologies to detect, analyse, and document fraudulent activity, including:</p>



<ul class="wp-block-list">
<li><strong>Forensic Accounting</strong> – Identifying irregularities, misstatements, and financial manipulation.</li>



<li><strong>Digital Forensics</strong> – Uncovering hidden communications, data breaches, and system misuse.</li>



<li><strong>Evidence Collection &amp; Documentation</strong> – Developing defensible reports to support litigation, regulatory action, or internal disciplinary processes.</li>
</ul>



<p>We deliver clarity where suspicion exists.</p>



<p>2. <strong>Due Diligence</strong></p>



<p>Every investment, acquisition, partnership, or major transaction carries inherent risk. Effective due diligence is not optional, it is essential.</p>



<p>Our due diligence services provide comprehensive insights into:</p>



<ul class="wp-block-list">
<li>Financial standing and operational stability</li>



<li>Regulatory compliance status</li>



<li>Litigation history and reputational exposure</li>



<li>Undisclosed liabilities or conflicts of interest</li>
</ul>



<p>We help clients enter transactions with full visibility and reduced uncertainty.</p>



<p>3. <strong>Background Checks</strong></p>



<p>Trust is important, verification is critical.</p>



<p>Our background screening services help organizations and individuals confirm credibility before making hiring, partnership, or investment decisions. We:</p>



<ul class="wp-block-list">
<li>Verify employment history, academic credentials, and professional certifications</li>



<li>Authenticate documents and qualifications</li>



<li>Review criminal and civil records where applicable</li>



<li>Identify potential reputational or integrity concerns</li>
</ul>



<p>Sound decisions begin with verified information.</p>



<p>4. <strong>Asset Tracing</strong></p>



<p>Hidden or undisclosed assets can complicate fraud investigations, debt recovery, shareholder disputes, and matrimonial matters.</p>



<p>Our asset tracing services establish:</p>



<ul class="wp-block-list">
<li>The physical existence and location of property or individuals</li>



<li>Ownership structures and beneficial interests</li>



<li>Asset movement patterns and economic status analysis</li>



<li>Links between entities and individuals through ownership trail reviews</li>
</ul>



<p>We uncover what others attempt to conceal.</p>



<p><strong>Conclusion</strong></p>



<p>Fraud, hidden liabilities, and undisclosed assets pose serious threats to business continuity and personal financial security.</p>



<p>At <strong>RISKHOUSE INTERNATIONAL</strong>, we combine forensic expertise, rigorous investigation, and timely reporting to provide accurate, actionable intelligence. Our work equips clients with the clarity they need to mitigate risk, protect their interests, and make informed strategic decisions.</p>
<p>The post <a rel="nofollow" href="https://riskhouse.co.ke/riskhouse-international-protecting-your-interests/">Riskhouse International: Protecting Your Interests</a> appeared first on <a rel="nofollow" href="https://riskhouse.co.ke">Riskhouse International Limited</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Digital Credit and Data Protection in Kenya</title>
		<link>https://riskhouse.co.ke/digital-credit-and-data-protection-in-kenya/</link>
		
		<dc:creator><![CDATA[riskuser]]></dc:creator>
		<pubDate>Mon, 08 Dec 2025 08:37:11 +0000</pubDate>
				<category><![CDATA[Consulting]]></category>
		<category><![CDATA[Investigations]]></category>
		<category><![CDATA[Riskhouse International]]></category>
		<guid isPermaLink="false">https://riskhouse.co.ke/?p=8982</guid>

					<description><![CDATA[<p>In Kenya, the creation of digital credit apps has opened access to small-loans for many who are under-banked. However, alongside this growth have come serious concerns about misuse of personal data, unethical recovery practices, and breaches of privacy rights. </p>
<p>The post <a rel="nofollow" href="https://riskhouse.co.ke/digital-credit-and-data-protection-in-kenya/">Digital Credit and Data Protection in Kenya</a> appeared first on <a rel="nofollow" href="https://riskhouse.co.ke">Riskhouse International Limited</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>In Kenya, the creation of digital credit apps has opened access to small-loans for many who are under-banked. However, alongside this growth have come serious concerns about misuse of personal data, unethical recovery practices, and breaches of privacy rights. The combination of sensitive data collection, weak enforcement, and aggressive debt-collection tactics has made this a major consumer-protection issue.</p>



<p>Mobile/digital credit providers in Kenya have been flagged for various data protection and harassment practices:</p>



<ul class="wp-block-list">
<li>In 2022 the Office of the Data Protection Commissioner (ODPC) reported that by 30<sup>th</sup> September it had received 1,030 complaints; of those, 555 were admitted, with 299 relating to digital lenders.</li>



<li>Some lenders were found to be accessing borrowers’ phone contacts, sending messages to those contacts, sharing data with third-parties, or posting personal data of defaulters.</li>



<li>One lender, White path Company Limited (owner of several apps) was fined Kes. 5 million after about 150 complaints for mining contacts and sending unsolicited messages.</li>



<li>Another provider, Mulla Pride Ltd (apps: Ke Credit, Fair Cash) was fined Kes 2.9 million for using names/contacts obtained from third parties to shame borrowers.</li>



<li>There have been reports of apps requesting access to messages, location, calendar, contacts and then using that data for credit scoring or post-default pressure.</li>
</ul>



<p>While digital credit can promote access, many apps operate with little transparency, and misuse of personal data is widespread.</p>



<p><strong>Mechanisms of Data Collection &amp; Abuse</strong></p>



<p><strong><em>What data is collected?</em></strong></p>



<p>Many of these loan apps request wide permissions when installed:</p>



<ul class="wp-block-list">
<li>Access to contacts and call logs.</li>



<li>Access to messages, mobile money transaction history, location, calendar.</li>



<li>Some share data with third-party analytics / marketing firms or credit bureaus without clear consent.</li>
</ul>



<p><strong><em>How misuse happens</em></strong></p>



<ul class="wp-block-list">
<li>Debt-shaming tactics: Borrower defaults, app uses contact list to message friends/family of borrower, or threatening calls to contacts.</li>



<li>Unauthorized sharing of borrower data with third party debt collectors or marketing firms.</li>



<li>Lack of informed consent: Borrowers may not understand the extent of data being collected or how it’s used.</li>



<li>Unlicensed or rogue apps: Some apps operate without being properly regulated/licensed, thus operate with fewer safeguards.</li>
</ul>



<p><strong>Regulatory &amp; Legal Responses</strong></p>



<p><strong><em>Key laws &amp; rules</em></strong></p>



<ul class="wp-block-list">
<li><strong>The Data Protection Act, 2019 (Kenya)</strong> lays out rights of data subjects, obligations of data controllers/processors including breach-notification duties.</li>



<li>The <strong>Central Bank of Kenya (CBK)’s Digital Credit Providers Regulations 2021</strong>: Lenders must be licensed as Data Controllers and Processors, they must avoid unauthorised calls to contacts, must not harass borrowers, must obtain consent for third-party data sharing.</li>



<li>The ODPC has powers under Section 63 of the Data Protection Act to impose penalties for non-compliance.</li>



<li>Platform rules: Google (Play Store) updated policy in 2023, banning personal-loan apps from accessing photos/contacts unless essential.</li>
</ul>



<p><strong>What borrowers Should Do</strong></p>



<ul class="wp-block-list">
<li><strong>Check licensing</strong>: Before borrowing from a mobile-loan app, verify whether it is a licensed DCP (digital credit provider) under CBK regulations.</li>



<li><strong>Review permissions</strong>: When installing the loan app, look at what permissions you are granting (contacts, SMS, location) and whether those are reasonable for a loan-app.</li>



<li><strong>Read the privacy policy</strong>: Though often lengthy, see whether the app clearly states how your data will be used, with whom data will be shared, and what rights you have.</li>



<li><strong>Limit access</strong>: If an app is requesting access to data not clearly required (e.g., contacts, photos), you may consider declining or using a different provider.</li>



<li><strong>Protect your contacts</strong>: Be mindful of which apps have access to your address book; avoid granting unnecessary permissions when possible.</li>



<li><strong>Report abuses</strong>: If you receive harassing messages/calls from a lender or your contacts are being targeted, lodge a complaint with the ODPC.</li>



<li><strong>Budget carefully</strong>: Borrow only what you can repay, understand the interest and penalty structure, and avoid rolling over short-term apps into deeper debt.</li>
</ul>



<p><strong>Conclusion</strong></p>



<p>The rise of mobile-loan apps in Kenya has created both opportunities and risks. On one hand, they provide quick access to credit. On the other, they have been implicated in serious breaches of data protection, harassment of borrowers and misuse of contacts and device data. The regulatory framework is evolving, with enforcement actions increasingly visible, but gaps remain. Borrowers must remain vigilant, understand their rights, and take care in choosing loan apps and controlling the data they share. At <strong>RISKHOUSE INTERNATIONAL</strong>, we have a team of professionals with the expertise to offer continuous data protection training, data protection impact assessment (DPIA), data protection compliance among others. We would be happy to serve you! Contact us at <a href="mailto:info@riskhouse.co.ke">info@riskhouse.co.ke</a> .</p>
<p>The post <a rel="nofollow" href="https://riskhouse.co.ke/digital-credit-and-data-protection-in-kenya/">Digital Credit and Data Protection in Kenya</a> appeared first on <a rel="nofollow" href="https://riskhouse.co.ke">Riskhouse International Limited</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The risk of social media cryptocurrency scams in Kenya despite VASP regulation</title>
		<link>https://riskhouse.co.ke/the-risk-of-social-media-cryptocurrency-scams-in-kenya-despite-vasp-regulation/</link>
		
		<dc:creator><![CDATA[riskuser]]></dc:creator>
		<pubDate>Wed, 29 Oct 2025 11:17:37 +0000</pubDate>
				<category><![CDATA[Consulting]]></category>
		<category><![CDATA[Financial]]></category>
		<category><![CDATA[Riskhouse International]]></category>
		<guid isPermaLink="false">https://riskhouse.co.ke/?p=8973</guid>

					<description><![CDATA[<p>Kenya’s recent enactment of the Virtual Asset Service Providers (VASP) Bill into Law marks a milestone in regulating the crypto industry. The law imposes clear obligations on Virtual Asset Service Providers (Exchanges, Custodians, Brokers, Investment Advisors, Initial Coin offering providers), including licensing, capital requirements, cybersecurity, AML/CFT compliance and consumer protection, with regulatory oversight from the CBK and CMA. </p>
<p>The post <a rel="nofollow" href="https://riskhouse.co.ke/the-risk-of-social-media-cryptocurrency-scams-in-kenya-despite-vasp-regulation/">The risk of social media cryptocurrency scams in Kenya despite VASP regulation</a> appeared first on <a rel="nofollow" href="https://riskhouse.co.ke">Riskhouse International Limited</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Kenya’s recent enactment of the Virtual Asset Service Providers (VASP) Bill into Law marks a milestone in regulating the crypto industry. The law imposes clear obligations on Virtual Asset Service Providers (Exchanges, Custodians, Brokers, Investment Advisors, Initial Coin offering providers), including licensing, capital requirements, cybersecurity, AML/CFT compliance and consumer protection, with regulatory oversight from the CBK and CMA.</p>



<p>However, while CBK &amp; CMA aims to protect consumers by licensing and overseeing service providers, it cannot fully eliminate the wave of scams flourishing on social media platforms like Telegram, WhatsApp, TikTok, Twitter/X, and Instagram.</p>



<p><strong>The Psychology Behind Crypto Scams</strong></p>



<p>Scammers and Influencers prey on human psychology, exploiting <strong>greed</strong> and <strong>the fear of missing out (FOMO)</strong>, to lure victims with false promises of quick, guaranteed returns. In addition, buzzwords such as “CBK licensed” or “CMA regulated” will be frequently misused to create a false confidence and to persuade people to invest, often without verifying the legitimacy.</p>



<p><strong>Key Social Media Cryptocurrency Scams to Watch Out for:</strong></p>



<ol class="wp-block-list">
<li><strong>Cryptocurrency-based Ponzi Scheme</strong>: Aggressively advertised on WhatsApp or Telegram groups promising high, risk-free returns.</li>



<li><strong>Cryptocurrency-based Job scams</strong>: Scammers posing as legitimate company employees lure victims through social media posts or text messages offering fake part-time jobs and assigning fake click-based tasks through scam websites.</li>



<li><strong>Pump and dump schemes</strong>: Scammers use social media to artificially hype up a low-value cryptocurrency, spreading false claims to drive up its price and later sell causing the price to crash.</li>



<li><strong>Impersonation Scams</strong>: Fraudulent profiles mimicking exchanges, regulators like CBK or CMA, or industry influencers to gain trust and steal funds.</li>



<li><strong>Fraudulent Celebrity Endorsements</strong>: Deepfake videos/ audio using AI, fake testimonials, or paid influencers on Instagram, TikTok, or Facebook promoting fake ICOs and Coins.</li>



<li><strong>Phishing links:</strong> post pushing a link via DMs to “claim tokens”, verify an account” or “fake transactional approval prompts”, once link is clicked the scammer steals the cryptocurrency.</li>



<li><strong>Pig butchering scams (also known as Romance scams)</strong>: a long-term investment scam, often involving cryptocurrency, where scammers “fatten up” the victim (“the pig”) with trust and affection before “butchering” them, i.e. stealing a large amount of money.</li>
</ol>



<p>According to Chainalysis (Blockchain Analytical firm), approximately $9.9billion was lost to crypto scams globally in the year 2024. In addition, recent reports from Kenya and Nigeria, an estimated amount of $840million was lost by investors, through Crypto Bridge Exchange(CBEX), which advertised itself as a “crypto-powered trading platform backed by artificial intelligence, promising tantalizing returns of up to 100% in just 30 days”,&nbsp; and required only a simple sign-up through a website or app, often shared via WhatsApp or Telegram by trusted friends” (Source: &nbsp;<a href="https://www.chainalysis.com/blog/2024-pig-butchering-scam-revenue-grows-yoy/">Chainalysis.com</a> , <a href="https://kenyanwallstreet.com/special-report-cbex-and-the-echoes-of-crypto-scams/">Kenyanwallstreet.com</a>)</p>



<p>While the VASP Act strengthens oversight of Virtual Asset Service Providers, it does not extend to the informal and fast-moving world of social media where scams thrive. Regulations is critical foundation, but effective protection requires a layered approach, combining consumer education, and expert advice.</p>



<p>At&nbsp;<strong>RISKHOUSE INTERNATIONAL</strong>, we help our clients navigate Kenya’s evolving crypto landscape with confidence. Our tailored services include risk assessments, scam awareness training, Blockchain forensics, and regulatory crypto compliance. We boast of a team of expert investigators who integrate fraud and risk management, regulatory compliance, blockchain forensics, and legal advisory to build frameworks that reflect both the regulator’s expectations and market realities. Partner with <strong>RISKHOUSE INTERNATIONAL</strong>, to assess your readiness, identify exposure, and build crypto compliance systems that work in practice to stay competitive in Kenya’s Crypto regulatory landscape.</p>
<p>The post <a rel="nofollow" href="https://riskhouse.co.ke/the-risk-of-social-media-cryptocurrency-scams-in-kenya-despite-vasp-regulation/">The risk of social media cryptocurrency scams in Kenya despite VASP regulation</a> appeared first on <a rel="nofollow" href="https://riskhouse.co.ke">Riskhouse International Limited</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The law of employment Kenya and the place of employer investigations on employees</title>
		<link>https://riskhouse.co.ke/the-law-of-employment-kenya-and-the-place-of-employer-investigations-on-employees/</link>
		
		<dc:creator><![CDATA[riskuser]]></dc:creator>
		<pubDate>Wed, 03 Sep 2025 13:40:21 +0000</pubDate>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[Consulting]]></category>
		<category><![CDATA[Riskhouse International]]></category>
		<guid isPermaLink="false">https://riskhouse.co.ke/?p=8959</guid>

					<description><![CDATA[<p>The legal standard governing termination from employment in Kenya is found in Sections 41 and 45 of the Employment Act, 2007. Section 41 provides for procedural fairness. Before termination, an employee must be informed of the reasons and given a meaningful chance to respond, with the right to have a representative present.</p>
<p>The post <a rel="nofollow" href="https://riskhouse.co.ke/the-law-of-employment-kenya-and-the-place-of-employer-investigations-on-employees/">The law of employment Kenya and the place of employer investigations on employees</a> appeared first on <a rel="nofollow" href="https://riskhouse.co.ke">Riskhouse International Limited</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><strong>CASE STUDY</strong></p>



<p><strong>NG’ENO V. EAST AFRICAN BREWERIES PLC [2025]&nbsp;KEELRC&nbsp;2188&nbsp;(KLR)</strong></p>



<p>(<a href="https://new.kenyalaw.org/akn/ke/judgment/keelrc/2025/2188/eng@2025-07-24" target="_blank" rel="noreferrer noopener">https://new.kenyalaw.org/akn/ke/judgment/keelrc/2025/2188/eng@2025-07-24</a>)</p>



<p><strong>The Facts of this Case are as follows;</strong></p>



<p>Bernard Ng’eno is the Claimant in this case and a former employee of the Respondent. East African Breweries PLC is the Respondent herein and the former employer of Bernard Ng’eno.</p>



<p>Bernard Ng’eno joined East African Breweries PLC in 2011 as a Sales Representative. By 2023, he had risen through the ranks to the position of Divisional Sales Manager-Mountain, reporting to the Commercial Director.</p>



<p>On 21<sup>st</sup> September 2023, the Human Resources Director and the Commercial Director, asked to meet Bernard Ng’eno. At the meeting, Bernard Ng’eno was informed of a decision to suspend him from work, to pave way for investigations into allegations of irregular transactions. The management were concerned with “fraudulent activities” involving two major events dubbed “Isiolo Fest” and “Embu Sevens Activation”. According to East African Breweries, Bernard had approved Monitoring and Evaluation reports that exaggerated event outcomes, allegedly in collaboration with others. There was also a separate claim that he had failed to report the loss of a company-issued phone promptly, a matter they treated as another indicator of negligence or dishonesty. After investigations were concluded, East African Breweries put Bernard through a disciplinary process, eventually terminating his employment with the company on 7<sup>th</sup> November 2023.</p>



<p>Bernard sued his former employer, alleging among other things that his termination from employment was unfair and procedurally flawed. He particularly claimed that the disciplinary process was one sided and that the evidence he provided, including that of reporting the loss of the phone to the company’s IT department and even to the police, was not considered.</p>



<p><strong>Was Bernard Ng’eno’s termination by East African Breweries procedurally fair and based on a valid reason?</strong></p>



<p>Ng’eno told the Court that event planning and reporting was a shared responsibility, and that he had relied on data already approved in the system. As for the phone, he insisted to the Court that he had reported its loss to the company’s IT department and even to the police, with documentation to prove it. He reiterated that despite his retorts, he was dismissed on November 7, 2023.</p>



<p><strong>What does the Law provide?</strong></p>



<p>The legal standard governing termination from employment in Kenya is found in Sections 41 and 45 of the Employment Act, 2007. <strong>Section 41</strong> provides for procedural fairness. Before termination, an employee must be informed of the reasons and given a meaningful chance to respond, with the right to have a representative present. <strong>Section 45</strong> states that a termination is unfair if the employer fails to prove that it was grounded in a valid reason and conducted fairly.</p>



<p><strong>Analysis</strong></p>



<p>The court acknowledged that the allegations were serious. Falsifying Monitoring and Evaluation reports and mismanaging company property could certainly constitute valid grounds for termination if proven. However, the court reiterated that a substantive reason alone is not enough. The process must also be fair. In assessing procedural fairness, the Court noted that Bernard Ng’eno had specifically requested key for documents before his disciplinary hearing, including the internal investigation report and statements from witnesses, which East African Breweries were relying on. The company refused to share them, citing confidentiality. The court underscored that fairness demands disclosure, especially when that evidence forms the foundation of serious accusations. Denying Ng’eno access to the very documents being used against him violated Section 41 of the Employment Act and undermined his ability to defend himself effectively. The Judge reiterated that once an employer uses certain evidence to support disciplinary action, it loses the right to withhold that evidence on grounds of confidentiality.</p>



<p>In trying to strengthen its case on Bernard’s misconduct, the company included as part of its documents, a letter from Kenyatta University regarding Ng’eno’s discontinued academic program. The Court stated that its inclusion, without explanation or giving Ng’eno a chance to respond, was prejudicial and malicious at worse.</p>



<p>In conclusion therefore, the court found that although East African Breweries had a substantive reason to initiate a disciplinary process, the procedure was flawed and it did not meet the requirements of Section 41 And 45 of the Employment Act, thereby rendering Bernards termination of employment unlawful and unfair.</p>



<p><strong>Conclusion</strong></p>



<p>Bernard Ng’eno was awarded 12 months’ salary as compensation for unfair termination, totalling Kes. 10,058,300, and one-month’s salary in lieu of notice, amounting to Kes. 838,199. In total he was awarded <strong>Kes. 10,896,787</strong>.</p>



<p><strong>Our Role</strong></p>



<p><strong>RISKHOUSE INTERNATIONAL</strong> plays a vital role in supporting employers during workplace investigations by offering independent, professional services that are both thorough and legally sound.</p>



<p>In cases where allegations involve issues like financial misconduct, document irregularities or unreported asset loss, Riskhouse conducts detailed forensic investigations using digital analysis, financial audits and document examination to uncover the facts. The evidence we collect and the reports we produce are structured to meet the evidentiary burden required in disciplinary proceedings, arbitration or court, while maintaining strict data protection standards to preserve personal and sensitive information.</p>



<p>Our investigations are impartial, well-documented and compliant with both legal and ethical standards, helping employers make informed decisions and avoid procedural missteps that could lead to claims of unfair termination.</p>



<p>At&nbsp;<strong>RISKHOUSE INTERNATIONAL</strong>, we boast of a team of expert investigators who have continually assisted our clients with their pre-employment, employment and post-employment needs. Our team incorporates specialists in intelligence analysis, financial investigations, cyber security and legal advisory, allowing our clients to make informed hiring decisions and manage or avoid altogether, potential risks to their organisations.&nbsp;&nbsp;With a multidisciplinary team and a commitment to confidentiality, Riskhouse ensures that every investigation stands up to scrutiny and protects the integrity of both the organisation and its people.</p>



<p>Kindly reach us on email at <a href="mailto:info@riskhouse.co.ke">info@riskhouse.co.ke</a>. We are capable, willing and would be happy to help you with all your pre-employment, employment and post-employment needs.</p>
<p>The post <a rel="nofollow" href="https://riskhouse.co.ke/the-law-of-employment-kenya-and-the-place-of-employer-investigations-on-employees/">The law of employment Kenya and the place of employer investigations on employees</a> appeared first on <a rel="nofollow" href="https://riskhouse.co.ke">Riskhouse International Limited</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Employee background checks</title>
		<link>https://riskhouse.co.ke/employee-background-checks/</link>
		
		<dc:creator><![CDATA[riskuser]]></dc:creator>
		<pubDate>Wed, 30 Jul 2025 07:34:17 +0000</pubDate>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[Consulting]]></category>
		<category><![CDATA[Riskhouse International]]></category>
		<guid isPermaLink="false">https://riskhouse.co.ke/?p=8949</guid>

					<description><![CDATA[<p>Background checks are a process used by employers to verify the accuracy of a candidate’s personal, professional, and financial history. This type of investigation involves examining a variety of records, such as criminal history, employment verification, education credentials, credit reports, and references.</p>
<p>The post <a rel="nofollow" href="https://riskhouse.co.ke/employee-background-checks/">Employee background checks</a> appeared first on <a rel="nofollow" href="https://riskhouse.co.ke">Riskhouse International Limited</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><strong>WHAT ARE BACKGROUND CHECKS?&nbsp;</strong>&nbsp;</p>



<p>Background checks are a process used by employers to verify the accuracy of a candidate’s personal, professional, and financial history. This type of investigation involves examining a variety of records, such as criminal history, employment verification, education credentials, credit reports, and references. What most Employers aim to achieve with this process is to assess whether a candidate is trustworthy, qualified, and a good fit for the organization they are looking to join, while also helping to mitigate potential risks such as fraud, negligence, or workplace misconduct.&nbsp;</p>



<p><strong>JUST HOW IMPORTANT AND EFFECTIVE ARE BACKGROUND CHECKS?&nbsp;</strong>&nbsp;</p>



<p>A thorough background check has become a vital component of the recruitment process. The business culture in Nairobi has always been characterised as fast-paced. A fast-paced business environment may mean higher risks and what determines the success or not of an entity is how efficiently this entity is able to mitigate such risks that threaten their profit up streaks.&nbsp;&nbsp;</p>



<p>Employee Background Checks is one such strategy. Also known as pre-employment screening, employee background checks help employers verify the credentials, experience, and integrity of potential hires, confirming their educational qualifications, criminal records and lack thereof and credit history where relevant. Background checks serve as a protective measure against potential risks, ensuring that organizations make informed and responsible hiring decisions.&nbsp;</p>



<p><strong>CASE STUDY&nbsp;</strong>&nbsp;</p>



<p><strong>AMBASA V. EQUITY BANK (K) LIMITED &amp; ANOTHER [2025] KEELRC 2113 (KLR)</strong>&nbsp;</p>



<p>In a recent decision by the Employment and Labour Relations Court in Nairobi, the court found that the Petitioner, Benard Okoth Ambasa, was not unfairly and unlawfully terminated as he alleged, after the 1<sup>st</sup> Respondent, Equity Bank, terminated Bernard’s employment due to “<em>unsatisfactory background screening results</em>”, after just a few weeks of him starting there.&nbsp;&nbsp;</p>



<p><strong>Facts</strong>&nbsp;</p>



<p>Bernard Okoth Ambasa is the Petitioner herein and a former employee of the 1<sup>st</sup> Respondent. Equity Bank is the 1<sup>st</sup> Respondent and former employer of the Petitioner. Dr. Dorcas Kiai is the 2<sup>nd</sup> Respondent, and was at the time, a Human Resource Practitioner at the 1<sup>st</sup> Respondent – the Bank.&nbsp;</p>



<p>Dr. Dorcas Kiai and Bernard Okoth Ambasa were former colleagues at Kenya Revenue Authority (KRA) before Dorcas moved to Equity Bank. On 09.12.2024, Dorcas texted Bernard on WhatsApp and shared with him that Equity was looking to hire a General Manager – Human Resource Employee Relations. She further informed him that her Group HR, David Ssegawa thought he would be interested in the role, and she was reaching out to see whether he was.&nbsp;</p>



<p>Bernard answered Dorcas in the affirmative and in the course of the few days to come, on Dorcas’ request, he shared with her his profile and credentials. Bernard had his first interview with the Bank on 19.12.2024 and his second interview on 09.01.2025. On 22.01.2025, the Bank gave him an offer via email. Bernard counter offered and the two parties (Bernard and the Bank) negotiated the terms of the employment. Finally, on 24.01.2025, the Bank gave Bernard a further offer of a consolidated salary of Kes. 950,000/-. He accepted this offer on that same date.&nbsp;&nbsp;</p>



<p>Bernard later received his appointment letter on 30.01.2025 and he was required to start his new role on 10.02.2025.&nbsp;&nbsp;</p>



<p><strong>Issue &amp; Analysis</strong>&nbsp;</p>



<p>According to Equity’s Human Reasource Policy and Manual, since the petitioner had been employed at the job level of General Manager, he was subject to “<em>background screening and enhanced screening</em>”. Further, Equity requires all employees and potential employees “<em>during the probation period and after confirmation of employment, to declare all business interests…” “…</em><em> </em><em>declaring false information, including leaving out information that is relevant to what the employee owns in terms of businesses, will lead to disciplinary action</em>.”&nbsp;</p>



<p>The Bank contracted Spectrum Network International to conduct a background check on Bernard. The investigation revealed that the petitioner was a Director at Yarrow Spa &amp; Barber Shop, registration number BN_X2C8XBMY, Dokam Travels (BN_P6C2G57) and Roekam Executive Barbers &amp; Spa (BN_GVCQQYLY). The Respondents explained to the Court that “<em>The petitioner failed to disclose the said businesses and his directorship in the declaration form he signed on 10.02.2025. He only disclosed two businesses (Resourcing and People Management Limited and Grand Dominion Ltd) in the said form and left out the high-risk businesses for money laundering that are mostly flagged by Banks</em>.”&nbsp;</p>



<p>The Respondents in their replying affidavit continued; “<em>The petitioner had a fiduciary duty to disclose all information that could affect the mind of the decision-maker in whether or not to confirm him to full employment as per the contractual terms</em>.” “…” “<em>With the banking industry being a sensitive sector, all employees and potential employees are supposed to be above suspicion like Caesar’s wife, and any suspicion of dishonesty and integrity issues leads to automatic separation</em>”.&nbsp;&nbsp;</p>



<p>Bernard’s contract of service with the Bank was terminated on 04.04.2025.&nbsp;&nbsp;</p>



<p><strong>Determination</strong>&nbsp;</p>



<p>The issue before court was whether Bernard’s termination was unfair.&nbsp;&nbsp;</p>



<p>The court found that his termination was not unfair nor unlawful because as per the letter of appointment he signed on 30.01.2025, during the first six months (probation period), his employment was “…<em>subject to satisfactory background screening results</em>…” and which screening results the Bank had found unsatisfactory.&nbsp;&nbsp;</p>



<p>In dismissing the suit, the Court stated, “<strong>The background checks were not a disciplinary process but was part of the recruitment, selection and appointment processes</strong>…”&nbsp;</p>



<p><strong>CONCLUSION</strong>&nbsp;</p>



<p>Employee background checks are an essential component of modern hiring practices. They offer employers a reliable means of verifying a candidate’s integrity and reducing workplace risks. Equity Bank for example was able to flag “<em>high-risk businesses for money laundering that are mostly flagged by Banks</em>”. Conducted within the bounds of applicable labour laws, constitutional protections, and data privacy regulations, background checks are endorsed by Courts of Law such as was in this case of <strong>Ambasa V. Equity Bank (K) Limited &amp; another [2025] KEELRC 2113 (KLR)</strong> (<a href="https://new.kenyalaw.org/akn/ke/judgment/keelrc/2025/2113/eng@2025-07-17" target="_blank" rel="noreferrer noopener">https://new.kenyalaw.org/akn/ke/judgment/keelrc/2025/2113/eng@2025-07-17</a>).&nbsp;&nbsp;</p>



<p>At <strong>RISKHOUSE INTERNATIONAL</strong>, we boast of a team of expert investigators who have continually assisted our clients with their pre-employment needs, through a mix of analysis of publicly available information, human source inquiries and overt investigations. Our team incorporates specialists in intelligence analysis, financial investigations, cyber security and legal advisory allowing our clients to make informed hiring decisions and manage or avoid altogether, potential risks to their organisations.&nbsp;&nbsp;</p>
<p>The post <a rel="nofollow" href="https://riskhouse.co.ke/employee-background-checks/">Employee background checks</a> appeared first on <a rel="nofollow" href="https://riskhouse.co.ke">Riskhouse International Limited</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Anti-Bribery and Anti-Corruption Assistance</title>
		<link>https://riskhouse.co.ke/anti-bribery-and-anti-corruption-assistance/</link>
		
		<dc:creator><![CDATA[Michael Wainaina]]></dc:creator>
		<pubDate>Mon, 15 May 2023 07:58:03 +0000</pubDate>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[Consulting]]></category>
		<category><![CDATA[Financial]]></category>
		<category><![CDATA[Investigations]]></category>
		<category><![CDATA[Riskhouse International]]></category>
		<category><![CDATA[Anti bribery]]></category>
		<guid isPermaLink="false">https://riskhouse.co.ke/?p=8890</guid>

					<description><![CDATA[<p>Anti-Bribery and Anti-Corruption Assistance Occupational fraud typologies highlight different forms of fraud, one of which is corruption. Business corruption is categorized as the second most common type of occupational fraud, with the primary examples being bribery, conflict of interest, improper gratuities, and economic extortion. Bribery and corruption pose significant risks to organizations as they may [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://riskhouse.co.ke/anti-bribery-and-anti-corruption-assistance/">Anti-Bribery and Anti-Corruption Assistance</a> appeared first on <a rel="nofollow" href="https://riskhouse.co.ke">Riskhouse International Limited</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h4><strong>Anti-Bribery and Anti-Corruption Assistance</strong></h4>
<p>Occupational fraud typologies highlight different forms of fraud, one of which is corruption. Business corruption is categorized as the second most common type of occupational fraud, with the primary examples being bribery, conflict of interest, improper gratuities, and economic extortion. Bribery and corruption pose significant risks to organizations as they may be subjected to legal, regulatory, and reputational damage. Additionally, a history of corruption can constitute a reputational risk that if not mitigated, may drive away investors, partners, clients, and future employees.</p>
<p>Therefore, zero tolerance for bribery and corruption is essential as it ensures sustainability and business integrity in any organization. Organizations should have robust policies, procedures, and programs to mitigate bribery and corruption risks. Organizations should also train and educate stakeholders to increase their understanding and awareness. An effective Anti-Bribery and Anti-Corruption program should lay focus on the following key areas: &#8211;</p>
<ul>
<li style="list-style-type: none;">
<ul>
<li><strong>Top management commitment</strong> – this entails tone at the top and senior management commitment to upholding ethical conduct and integrity.</li>
<li><strong>Risk Assessment</strong> – this entails assessments and subsequent assessments of the organization’s bribery and corruption risks.</li>
<li><strong>Proportionate Procedures</strong> – this involves developing procedures based on risk assessment and ensuring that there is an investigation procedure in place.</li>
<li><strong>Training and Information Communication</strong> – this involves training all levels of employees on whistleblowing and mechanisms of reporting bribery and corruption.</li>
<li><strong>Due Diligence</strong> – this involves applying appropriate due diligence procedures to third parties including name screening, integrity, and corruption checks.</li>
<li><strong>Monitoring and Review</strong> – this involves a continuous evaluation and validation of anti-bribery and anti-corruption programs.</li>
</ul>
</li>
</ul>
<p>At <strong>Riskhouse International</strong>, we help organizations spanning multiple jurisdictions to define, assess and respond to bribery and corruption issues. Further, we help organizations identify gaps and provide recommendations for mitigating bribery and corruption risks. We also support organizations with comprehensive Anti-Bribery &amp; Anti-corruption (ABAC) reviews, reviews of the existing relevant legislation, review of the existing policies and procedures, conducting transactions reviews and verifications of third parties.</p>
<p>To learn more about this and to catch up on our other news and alerts you can visit our blog on our website at <a href="https://riskhouse.co.ke/blog/">https://riskhouse.co.ke/blog/</a>.</p>
<p>The post <a rel="nofollow" href="https://riskhouse.co.ke/anti-bribery-and-anti-corruption-assistance/">Anti-Bribery and Anti-Corruption Assistance</a> appeared first on <a rel="nofollow" href="https://riskhouse.co.ke">Riskhouse International Limited</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Threat detection spectrum and advanced threat hunting.</title>
		<link>https://riskhouse.co.ke/threat-detection-spectrum-and-advanced-threat-hunting/</link>
		
		<dc:creator><![CDATA[Michael Wainaina]]></dc:creator>
		<pubDate>Thu, 04 May 2023 05:53:49 +0000</pubDate>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[Consulting]]></category>
		<category><![CDATA[Financial]]></category>
		<category><![CDATA[Investigations]]></category>
		<category><![CDATA[Riskhouse International]]></category>
		<category><![CDATA[Threat detection spectrum]]></category>
		<guid isPermaLink="false">https://riskhouse.co.ke/?p=8885</guid>

					<description><![CDATA[<p>Threat detection spectrum and advanced threat hunting. A network environment can be defined as a communications system that ties multiple users together. In such an environment, there is a need to establish control measures to detect advanced threats in the network. The security mechanism measures should identify the threat’s movement in, out, and laterally within [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://riskhouse.co.ke/threat-detection-spectrum-and-advanced-threat-hunting/">Threat detection spectrum and advanced threat hunting.</a> appeared first on <a rel="nofollow" href="https://riskhouse.co.ke">Riskhouse International Limited</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h4><strong>Threat detection spectrum and advanced threat hunting.</strong></h4>
<p>A network environment can be defined as a communications system that ties multiple users together. In such an environment, there is a need to establish control measures to detect advanced threats in the network. The security mechanism measures should identify the threat’s movement in, out, and laterally within the environment.</p>
<p>There is a need to establish a network detection response (NDR) that can identify and allow rapid and efficient response to threat incidents and analyze the network traffic matrix. This will enable the identification of zero-day exploits and unknown unidentified threats to enhance advanced security threat hunting and detection capabilities.</p>
<p>The organization should embrace the following practices to prevent the threats: &#8211;</p>
<ol>
<li>Human expertise &#8211; security experts should have the ability to observe and act on incidents for the purpose of preventing major damages the business may encounter.</li>
<li>An automated response &#8211; there is a need for integration and automation of security appliances to be capable of taking actions to block and mitigate potential threats as they are detected. This can be done by automatically blocking traffic from active IP addresses that are identified as known threats.</li>
<li>Artificial Intelligence/ Threat Intelligence – this is the integration of network devices and other applications by use of intelligence that feeds up-to-date information on known threats and cybercrime attackers on a network.</li>
</ol>
<p>At Riskhouse International, we assist the management and organizations to develop policies and standards that assess security control measures and embrace a healthy network environment. To learn more about this service and to catch up on our updates and alerts you can visit our website at <a href="https://riskhouse.co.ke/blog/">https://riskhouse.co.ke</a>.</p>
<p>The post <a rel="nofollow" href="https://riskhouse.co.ke/threat-detection-spectrum-and-advanced-threat-hunting/">Threat detection spectrum and advanced threat hunting.</a> appeared first on <a rel="nofollow" href="https://riskhouse.co.ke">Riskhouse International Limited</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Why Customer Due Diligence is Necessary in Combating Money Laundering</title>
		<link>https://riskhouse.co.ke/why-customer-due-diligence-is-necessary-in-combating-money-laundering/</link>
		
		<dc:creator><![CDATA[Michael Wainaina]]></dc:creator>
		<pubDate>Tue, 25 Apr 2023 09:18:45 +0000</pubDate>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[Consulting]]></category>
		<category><![CDATA[Financial]]></category>
		<category><![CDATA[Investigations]]></category>
		<category><![CDATA[Riskhouse International]]></category>
		<guid isPermaLink="false">https://riskhouse.co.ke/?p=8879</guid>

					<description><![CDATA[<p>Customer Due Diligence (CDD) is the process of verifying the identity of customers before establishing a business relationship with them as well as assessing their risk level. CDD assists businesses to manage risks of financial crime which include money laundering and terrorist financing. Criminals launder money mainly using the financial system to transfer funds. Financial [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://riskhouse.co.ke/why-customer-due-diligence-is-necessary-in-combating-money-laundering/">Why Customer Due Diligence is Necessary in Combating Money Laundering</a> appeared first on <a rel="nofollow" href="https://riskhouse.co.ke">Riskhouse International Limited</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Customer Due Diligence (CDD) is the process of verifying the identity of customers before establishing a business relationship with them as well as assessing their risk level. CDD assists businesses to manage risks of financial crime which include money laundering and terrorist financing.</p>
<p>Criminals launder money mainly using the financial system to transfer funds. Financial institutions, especially banks, are most vulnerable to abuse for laundering purposes. To protect themselves, financial institutions must have adequate controls and procedures in place that enable them to know the person whom they are dealing with. Enhanced due diligence on new and existing customers is a key part of these controls.</p>
<p>The application of thorough Customer Due Diligence (CDD) measures by financial institutions and a high degree of transparency is crucial to fight money laundering and the financing of terrorism effectively. Customer Due Diligence should be applied upon the establishment of a business relationship. Enhanced Due Diligence should also be applied where there is a receipt of a significant cash amount above normal threshold receipts. Customer Due Diligence measures should also be applied whenever financial institutions suspect money laundering or terrorist financing activities.</p>
<p><strong>The Legal Framework for Customer Due Diligence in Kenya.</strong></p>
<p>In Kenya, CDD is a legal requirement under the Proceeds of Crime and Anti-money Laundering Regulations, 2013. Under the regulations, reporting institutions which include banks, insurance companies, and microfinance institutions must undertake due diligence procedures before establishing a business relationship.</p>
<p>Specifically, institutions are required to identify customers using independent source documents, data, or information, verify the identity of beneficial owners and conduct ongoing due diligence on the business relationship to ensure that transactions being undertaken are consistent with the financial institution’s knowledge of the customer, their business and risk profile.</p>
<p><strong>Importance of Customer Due Diligence for Financial Institutions in Kenya</strong></p>
<p>One of the key benefits of conducting customer due diligence is the protection of the institution against reputational risk. Another benefit is the maintenance of customer trust. Lastly, CDD ensures the avoidance of regulatory fines and penalties. In Kenya, a reporting institution that contravenes the provisions of the regulations commits an offence and is liable to a fine not exceeding five million Kenya shillings or imprisonment for a term not exceeding three years or both.</p>
<p><strong>Riskhouse International Limited</strong> assists organizations to examine the effectiveness of their Anti-money laundering and Combating Financial Terrorism programs by offering AML/CFT Health Checks, KYC Diligence, Screening, and Remediation, AML/CFT Analytics, Monitoring, and Investigation, and AML/CFT Training and Awareness.</p>
<p>To learn more about this and to catch up on our other news and alerts you can visit our blog on our website at <a href="https://riskhouse.co.ke/blog/">https://riskhouse.co.ke/blog/</a></p>
<p>The post <a rel="nofollow" href="https://riskhouse.co.ke/why-customer-due-diligence-is-necessary-in-combating-money-laundering/">Why Customer Due Diligence is Necessary in Combating Money Laundering</a> appeared first on <a rel="nofollow" href="https://riskhouse.co.ke">Riskhouse International Limited</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Fraud risk assessment as a component of a fraud risk management</title>
		<link>https://riskhouse.co.ke/fraud-risk-assessment-as-a-component-of-a-fraud-risk-management/</link>
		
		<dc:creator><![CDATA[Michael Wainaina]]></dc:creator>
		<pubDate>Wed, 19 Apr 2023 06:22:52 +0000</pubDate>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[Consulting]]></category>
		<category><![CDATA[Financial]]></category>
		<category><![CDATA[Investigations]]></category>
		<category><![CDATA[Riskhouse International]]></category>
		<category><![CDATA[Fraud risk assessment]]></category>
		<guid isPermaLink="false">https://riskhouse.co.ke/?p=8868</guid>

					<description><![CDATA[<p>Fraud risk assessment as a component of a fraud risk management Fraud risk assessment is a component of fraud risk management strategy that helps an organization and its stakeholders protect itself against fraud. It is a technique by management to detect and understand their fraud exposure, fraud risks, and the efficiency of existing anti-fraud controls [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://riskhouse.co.ke/fraud-risk-assessment-as-a-component-of-a-fraud-risk-management/">Fraud risk assessment as a component of a fraud risk management</a> appeared first on <a rel="nofollow" href="https://riskhouse.co.ke">Riskhouse International Limited</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong>Fraud risk assessment as a component of a fraud risk management</strong></p>
<p>Fraud risk assessment is a component of fraud risk management strategy that helps an organization and its stakeholders protect itself against fraud. It is a technique by management to detect and understand their fraud exposure, fraud risks, and the efficiency of existing anti-fraud controls and solutions.</p>
<p>Fraud risk assessment involves a comprehensive examination of fraud vulnerabilities, control environment evaluation, determining the likelihood of fraud risk, identifying material gaps, remediation, regular revalidation, and control implementation approval.</p>
<p>The objective of the risk assessment process is to evaluate hazards and, if required, mitigate them by improving control measures. The four primary aspects of fraud risk assessment are:</p>
<ul>
<li><strong>Asset Misappropriation,</strong>which evaluates the indicators of missing cash, inventories, and other assets</li>
<li><strong>Non-financial and financial reporting,</strong>which evaluates inconsistencies that can indicate fraud in financial and non-financial reporting</li>
<li><strong>Illegal actions,</strong>which evaluate any fraudulent activities within an organization&#8217;s operation</li>
<li><strong>Regulatory compliance,</strong>which evaluates compliance with industry regulations and the organization&#8217;s efforts to meet regulatory standards.</li>
</ul>
<p>A fraud risk assessment is critical in assisting organizations to proactively identify external and internal risks that can damage their reputation and assets and expose them to criminal or civil liability.</p>
<p>As a result, Riskhouse International can assist your organization in implementing a rigorous fraud risk assessment methodology that includes fraud risk identification and documentation, fraud risk analysis, fraud risk evaluation, and fraud risk treatment. Fraud risk assessment quantifies risks and allows your organization to prioritize more damaging frauds. Riskhouse will adapt a fraud risk-tolerance limit to your organization&#8217;s needs based on the results of the fraud risk assessment.</p>
<p>To learn more about this and to catch up on our other news and alerts you can visit our blog on our website at <a href="https://riskhouse.co.ke/blog/">https://riskhouse.co.ke/blog/</a>.</p>
<p>The post <a rel="nofollow" href="https://riskhouse.co.ke/fraud-risk-assessment-as-a-component-of-a-fraud-risk-management/">Fraud risk assessment as a component of a fraud risk management</a> appeared first on <a rel="nofollow" href="https://riskhouse.co.ke">Riskhouse International Limited</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Preventive Strategies for Brand Infringement</title>
		<link>https://riskhouse.co.ke/preventive-strategies-for-brand-infringement/</link>
		
		<dc:creator><![CDATA[Michael Wainaina]]></dc:creator>
		<pubDate>Mon, 27 Mar 2023 09:23:56 +0000</pubDate>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[Consulting]]></category>
		<category><![CDATA[Investigations]]></category>
		<category><![CDATA[Riskhouse International]]></category>
		<category><![CDATA[Preventive Measures]]></category>
		<guid isPermaLink="false">https://riskhouse.co.ke/?p=8852</guid>

					<description><![CDATA[<p>Preventive Strategies for Brand Infringement. Brand protection is the process through which a rights holder puts in place actions/safeguards to protect their brand from any form of infringement. This may involve illegal use of the brand name, logo, or repackaging of products with impure content among other acts which might constitute a breach of your [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://riskhouse.co.ke/preventive-strategies-for-brand-infringement/">Preventive Strategies for Brand Infringement</a> appeared first on <a rel="nofollow" href="https://riskhouse.co.ke">Riskhouse International Limited</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong>Preventive Strategies for Brand Infringement.</strong></p>
<p>Brand protection is the process through which a rights holder puts in place actions/safeguards to protect their brand from any form of infringement. This may involve illegal use of the brand name, logo, or repackaging of products with impure content among other acts which might constitute a breach of your trademark, patent, design, and other forms of Intellectual Property.</p>
<p>Brand owners spend a lot of capital conducting extensive research, and putting forth all standard efforts to create a reputable brand, conducting a mega launch, marketing the brand, and making the product available to customers to begin generating income. When an infringer comes up with a fake version of the original brand and presents it to consumers as a temptingly cheap knockoff, the original brand owner experiences massive financial loss and a bad reputation, among other damages to the brand and the business.</p>
<p>To counter brand infringement, brand owners need to come up with strategies to safeguard and retain the integrity of their brand. Some of these strategies/approaches include but are not limited to the following: &#8211;</p>
<ol>
<li>Registration of your intellectual property rights to secure your brand in all target regions;</li>
<li>Develop technological protection tools to cover logo detection, image matching, barcode readers, and scanners to detect counterfeit products;</li>
<li>Secure your patent, trademark, and copyright to restrict others from using or manufacturing your products without your express permission;</li>
<li>Conducting surveillance in key markets to get to know how your brand is moving in various regions;</li>
<li>Conduct internal training to educate the team in the organization &#8211; there are potential teams and departments that can possibly spot and report suspicious products e.g., the sales team, digital marketing team, and the security and enforcement department;</li>
<li>Have clear organization policies on how to identify, whom to report to, and tools to use when dealing with trademark infringement;</li>
<li>Conduct business intelligence both through online brand watch and geographies to find out whether your brand is being infringed, find out which products are majorly affected and in which region;</li>
<li>Conducting consumer awareness is essential as once the consumer identifies a suspicious product on sale, they will reach out to the area distributors and manufacturing company to raise the concerns; and</li>
<li>Have a clear enforcement strategy once the products have been confirmed by relevant stakeholders to have been infringed. The perpetrators should be prosecuted accordingly to deter any further infringements.</li>
</ol>
<p>Effecting these strategies will help the manufacturer to come up with an effective solution to curb the menace of infringement in partnership with other stakeholders.</p>
<p><strong>How can we help? </strong></p>
<p>At Riskhouse international, we have a robust Intellectual Property Crime and Infringement Investigation team who are ready to provide you with Investigation services, tailored to your expectations. We conduct anti-counterfeit investigations, online trademark watch, brand reputation analysis, sample test purchases, brand market monitoring and survey, brand competition analysis, and trademark infringement investigation<strong>,</strong> and aim to provide excellent comprehensive written investigation reports to help you strengthen your brand reputation and prevent violation of Intellectual Property Rights in Commerce. We also offer solutions to enhance brand integrity.</p>
<p>To learn more about Intellectual Property Rights and Infringement Investigations and to catch up on our other news and alerts you can visit our blog on our website at <a href="https://riskhouse.co.ke/blog/">https://riskhouse.co.ke/blog/</a>.</p>
<p>The post <a rel="nofollow" href="https://riskhouse.co.ke/preventive-strategies-for-brand-infringement/">Preventive Strategies for Brand Infringement</a> appeared first on <a rel="nofollow" href="https://riskhouse.co.ke">Riskhouse International Limited</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
